Analysis
-
max time kernel
156s -
max time network
200s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 16:33
Static task
static1
Errors
General
-
Target
RNSM00364.7z
-
Size
14.7MB
-
MD5
e06f8014237bfda194279e651dfbfab2
-
SHA1
6a56b7cac0d0d80ba621175f894075b35c83f074
-
SHA256
3d045e21f0acdb2ff12903a57efbabf302b8ffc4bcf1c0e328837dfde5e00ec0
-
SHA512
455278347b3a54ee0c78b68fd17f1449d69b6557707e266f1be03abec6ed417e8041a7b3f010469fadf3f1104f2ccb437b6b05625b8f7b18fd5a10acc781b760
-
SSDEEP
393216:MDGRp+OCdCFXelJVPbkgg0P+Fuu2B0ztGorVeHHYE:fRApEgJVPb9g0PD7qEo0HH9
Malware Config
Extracted
gozi
Extracted
gozi
1805
bitsupport.top
databasecollection.pw
carloslimmheklo.at
genesisgrandergh.at
-
exe_type
worker
-
server_id
12
Extracted
C:\Users\Public\Desktop\README_LOCKED.txt
Extracted
F:\GIMAE-MANUAL.txt
gandcrab
http://gandcrabmfe6mnef.onion/20d13593c99f91cb
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
GandCrab payload 2 IoCs
resource yara_rule behavioral1/files/0x0005000000019999-64.dat family_gandcrab behavioral1/memory/1672-83-0x000000000F780000-0x000000000F796000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Gozi family
-
LockerGoga
LockerGoga is a ransomware that is primarily used in targeted, disruptive attacks.
-
Lockergoga family
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Contacts a large (7717) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe -
Renames multiple (107) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe -
Executes dropped EXE 36 IoCs
pid Process 3036 HEUR-Trojan-Ransom.MSIL.Blocker.gen-ad7fee685d2931a94b05f54ebe96ee1e49cb1dc9074c4af258f17b8a63292ffa.exe 3048 HEUR-Trojan-Ransom.Win32.Encoder.gen-a1ac9a4b39d6282b6906e4a856d4a30d287572e9ff2d1943e3234d723ec76e1e.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 1380 Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe 2668 Trojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exe 2864 Trojan-Ransom.Win32.Cryakl.ase-bbcdfd57739dab2c4d1ea6e3e209a4b829f200e7bbc9cc78b616e9b358880ebe.exe 336 Trojan-Ransom.Win32.Agent.auwv-eda26a1cd80aac1c42cdbba9af813d9c4bc81f6052080bc33435d1e076e75aa0.exe 3064 Trojan-Ransom.Win32.Blocker.kxrk-43280933a686aa7b979590dc1d00f2119e2f59f40ef739340994b976a943e988.exe 2992 Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe 2904 Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe 688 Trojan-Ransom.Win32.Foreign.nzfx-008c4bd6ee834d113cfc693af0ea90396eaa47e860bcdd567ffd964b57434e1d.exe 480 Trojan-Ransom.Win32.Jaff.bg-dd15ec17e469159196a0853bf14edb45a86054c71bc555e2cd0afc1c410917b2.exe 1196 Trojan-Ransom.Win32.Shade.oxs-29a5959e44fa700ad6608d0abce266820243789a8be8d56eb871c871d089ae15.exe 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe 3044 Trojan-Ransom.Win32.Foreign.njmq-36fa3541feafc5b08b7c8a335e8c9f79a4f87aaf7a2a86fea387944c0f0ebec1.exe 1084 Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe 1456 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe 792 Trojan-Ransom.Win32.Shade.ptc-1463e3b4597e2a1e81b939713d8ccdbdf7a53a7077aaaaab466d83692429e982.exe 1672 UDS-Trojan-Ransom.Win32.GandCrypt.a-3a84cd36849090c48212d6a2914bfba1d05ec98f1b245a0d268109c8d7a37d43.exe 2204 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 3236 Trojan-Ransom.Win32.Cryakl.ase-bbcdfd57739dab2c4d1ea6e3e209a4b829f200e7bbc9cc78b616e9b358880ebe.exe 3208 yxugwjud8720.exe 6640 yxugwjud8720.exe 6648 yxugwjud8720.exe 6632 yxugwjud8720.exe 6616 yxugwjud8720.exe 6600 yxugwjud8720.exe 6656 yxugwjud8720.exe 6624 yxugwjud8720.exe 6608 yxugwjud8720.exe 6592 yxugwjud8720.exe 6464 Client.exe 6584 yxugwjud8720.exe 7152 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe 10396 Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe 9804 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine Trojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exe -
Loads dropped DLL 11 IoCs
pid Process 3048 HEUR-Trojan-Ransom.Win32.Encoder.gen-a1ac9a4b39d6282b6906e4a856d4a30d287572e9ff2d1943e3234d723ec76e1e.exe 3064 Trojan-Ransom.Win32.Blocker.kxrk-43280933a686aa7b979590dc1d00f2119e2f59f40ef739340994b976a943e988.exe 1392 WerFault.exe 1392 WerFault.exe 1392 WerFault.exe 1392 WerFault.exe 3036 HEUR-Trojan-Ransom.MSIL.Blocker.gen-ad7fee685d2931a94b05f54ebe96ee1e49cb1dc9074c4af258f17b8a63292ffa.exe 6756 NOTEPAD.EXE 6756 NOTEPAD.EXE 3048 HEUR-Trojan-Ransom.Win32.Encoder.gen-a1ac9a4b39d6282b6906e4a856d4a30d287572e9ff2d1943e3234d723ec76e1e.exe 3048 HEUR-Trojan-Ransom.Win32.Encoder.gen-a1ac9a4b39d6282b6906e4a856d4a30d287572e9ff2d1943e3234d723ec76e1e.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/files/0x000700000001746f-68.dat agile_net -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Client.exe" HEUR-Trojan-Ransom.MSIL.Blocker.gen-ad7fee685d2931a94b05f54ebe96ee1e49cb1dc9074c4af258f17b8a63292ffa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\catsclnt = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Comrenum\\C_G1ring.exe" Explorer.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe = "C:\\Windows\\System32\\Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe" Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Trojan-Ransom.Win32.Shade.ptc-1463e3b4597e2a1e81b939713d8ccdbdf7a53a7077aaaaab466d83692429e982.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe -
Drops desktop.ini file(s) 14 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\desktop.ini Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\desktop.ini Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2039016743-699959520-214465309-1000\desktop.ini Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2039016743-699959520-214465309-1000\desktop.ini Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\Y: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\M: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\E: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\N: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\P: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\I: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\L: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\U: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\X: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\A: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\G: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\L: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\R: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\P: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\G: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\K: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\T: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\A: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\B: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\K: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\U: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\J: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\R: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\Z: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\S: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\V: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\Y: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\B: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\E: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\J: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\N: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\T: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\S: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\V: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe File opened (read-only) \??\I: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\W: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\X: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\Z: Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe File opened (read-only) \??\M: Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 bitbucket.org 15 bitbucket.org -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2668 Trojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exe 1380 Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1180 set thread context of 2204 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 56 PID 2864 set thread context of 3236 2864 Trojan-Ransom.Win32.Cryakl.ase-bbcdfd57739dab2c4d1ea6e3e209a4b829f200e7bbc9cc78b616e9b358880ebe.exe 62 PID 688 set thread context of 6748 688 Trojan-Ransom.Win32.Foreign.nzfx-008c4bd6ee834d113cfc693af0ea90396eaa47e860bcdd567ffd964b57434e1d.exe 77 PID 6748 set thread context of 1200 6748 svchost.exe 21 PID 1380 set thread context of 10396 1380 Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe 89 PID 1292 set thread context of 9804 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe 90 -
resource yara_rule behavioral1/memory/792-89-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/792-618-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/792-607-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/792-606-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/792-605-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/792-604-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1196-5241-0x0000000000400000-0x000000000060D000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME34.CSS Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\fr.pak Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\THMBNAIL.PNG.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\plugin.properties.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\batch_window.html.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-profiler.jar.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Dotted_Lines.emf Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.core.nl_zh_4.4.0.v20140623020002.jar Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0250997.WMF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\MP00132_.WMF Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Magadan Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01253_.GIF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Couture.xml.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay\TAB_OFF.GIF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\PSCONFIG.CHM Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Author2String.XSL Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00828_.WMF Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0297707.WMF Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152610.WMF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153093.WMF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187839.WMF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198712.WMF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00656_.WMF Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ql.nl_zh_4.4.0.v20140623020002.jar.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\SearchExport.mpeg Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\ffjcext.zip.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143752.GIF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0251871.WMF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\UnreadIcon.jpg.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files\Java\jdk1.7.0_80\include\jdwpTransport.h.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Belgrade.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Oriel.xml.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18237_.WMF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME33.CSS Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR4B.GIF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\net.properties.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-jvmstat.xml Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.databinding.nl_ja_4.4.0.v20140623020002.jar.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Winamac Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Civic.thmx.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Pretty_Peacock.jpg Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.nl_zh_4.4.0.v20140623020002.jar Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0295069.WMF Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR34F.GIF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\EST5EDT Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-sendopts.jar Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-keyring-impl.jar.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0285796.WMF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Jamaica Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0297749.WMF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\vk_swiftshader_icd.json.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs-nio2_zh_CN.jar.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\status.xml Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Black Tie.thmx Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Urumqi.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\MoreGames.dll.mui Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-services.xml.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BabyBlue.css.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File opened for modification C:\Program Files\VideoLAN\VLC\NEWS.txt.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153265.WMF.id-C99F91CB.[[email protected]].com Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 1392 1672 WerFault.exe 55 7360 6648 WerFault.exe 75 4160 6584 WerFault.exe 67 2732 6608 WerFault.exe 70 5548 6592 WerFault.exe 68 7872 6624 WerFault.exe 72 4196 6656 WerFault.exe 76 2228 6640 WerFault.exe 74 -
System Location Discovery: System Language Discovery 1 TTPs 37 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxugwjud8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxugwjud8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Jaff.bg-dd15ec17e469159196a0853bf14edb45a86054c71bc555e2cd0afc1c410917b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nzfx-008c4bd6ee834d113cfc693af0ea90396eaa47e860bcdd567ffd964b57434e1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxugwjud8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.njmq-36fa3541feafc5b08b7c8a335e8c9f79a4f87aaf7a2a86fea387944c0f0ebec1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxugwjud8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxugwjud8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxugwjud8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.GandCrypt.a-3a84cd36849090c48212d6a2914bfba1d05ec98f1b245a0d268109c8d7a37d43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxugwjud8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxugwjud8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Agent.auwv-eda26a1cd80aac1c42cdbba9af813d9c4bc81f6052080bc33435d1e076e75aa0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxugwjud8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-ad7fee685d2931a94b05f54ebe96ee1e49cb1dc9074c4af258f17b8a63292ffa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-a1ac9a4b39d6282b6906e4a856d4a30d287572e9ff2d1943e3234d723ec76e1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.ptc-1463e3b4597e2a1e81b939713d8ccdbdf7a53a7077aaaaab466d83692429e982.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxugwjud8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.oxs-29a5959e44fa700ad6608d0abce266820243789a8be8d56eb871c871d089ae15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxugwjud8720.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2752 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main Trojan-Ransom.Win32.Jaff.bg-dd15ec17e469159196a0853bf14edb45a86054c71bc555e2cd0afc1c410917b2.exe -
Modifies data under HKEY_USERS 35 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-19\Software\AppDataLow\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\mKZiuoSI explorer.exe Key created \REGISTRY\USER\S-1-5-20\Software\mKZiuoSI explorer.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-20 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\AppDataLow\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\AppDataLow\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\S-1-5-20\Software\mKZiuoSI Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\S-1-5-19\Software\mKZiuoSI explorer.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-20 explorer.exe Key created \REGISTRY\USER\S-1-5-20\Software\AppDataLow\mKZiuoSI Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\.DEFAULT explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\mKZiuoSI explorer.exe Key created \REGISTRY\USER\S-1-5-20\Software\AppDataLow\mKZiuoSI explorer.exe Key created \REGISTRY\USER\S-1-5-18 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\S-1-5-19 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\mKZiuoSI Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\.DEFAULT\Software\mKZiuoSI Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\S-1-5-19\Software\AppDataLow\mKZiuoSI Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\S-1-5-19\Software\mKZiuoSI Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\S-1-5-18 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\AppDataLow\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 explorer.exe Key created \REGISTRY\USER\.DEFAULT Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\S-1-5-19 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-19\Software\AppDataLow\mKZiuoSI explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\mKZiuoSI Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe -
Modifies registry class 18 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Software\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Software\AppDataLow\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Software Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Software\AppDataLow\mKZiuoSI explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Software\AppDataLow\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Software\AppDataLow\mKZiuoSI Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Software\mKZiuoSI Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Software\mKZiuoSI\PnXQIy3t = 43c3b35c5112a441851c8e01c819915bcd5e310be6dfe8c6f31581cb0086f44a6d8590168cb94c306a368b89d0b07f6da474be39c9725bb8fc214f1b1e34cf6b0100000000000000 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Software\mKZiuoSI explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Software\AppDataLow Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell NOTEPAD.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Trojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Trojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Trojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 HEUR-Trojan-Ransom.Win32.Encoder.gen-a1ac9a4b39d6282b6906e4a856d4a30d287572e9ff2d1943e3234d723ec76e1e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 HEUR-Trojan-Ransom.Win32.Encoder.gen-a1ac9a4b39d6282b6906e4a856d4a30d287572e9ff2d1943e3234d723ec76e1e.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 6756 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4172 schtasks.exe 9644 schtasks.exe 3088 schtasks.exe 8340 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 18 IoCs
pid Process 3036 HEUR-Trojan-Ransom.MSIL.Blocker.gen-ad7fee685d2931a94b05f54ebe96ee1e49cb1dc9074c4af258f17b8a63292ffa.exe 3048 HEUR-Trojan-Ransom.Win32.Encoder.gen-a1ac9a4b39d6282b6906e4a856d4a30d287572e9ff2d1943e3234d723ec76e1e.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 336 Trojan-Ransom.Win32.Agent.auwv-eda26a1cd80aac1c42cdbba9af813d9c4bc81f6052080bc33435d1e076e75aa0.exe 1380 Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe 2668 Trojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exe 2992 Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe 2864 Trojan-Ransom.Win32.Cryakl.ase-bbcdfd57739dab2c4d1ea6e3e209a4b829f200e7bbc9cc78b616e9b358880ebe.exe 2904 Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe 3044 Trojan-Ransom.Win32.Foreign.njmq-36fa3541feafc5b08b7c8a335e8c9f79a4f87aaf7a2a86fea387944c0f0ebec1.exe 688 Trojan-Ransom.Win32.Foreign.nzfx-008c4bd6ee834d113cfc693af0ea90396eaa47e860bcdd567ffd964b57434e1d.exe 1084 Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe 480 Trojan-Ransom.Win32.Jaff.bg-dd15ec17e469159196a0853bf14edb45a86054c71bc555e2cd0afc1c410917b2.exe 1456 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe 1196 Trojan-Ransom.Win32.Shade.oxs-29a5959e44fa700ad6608d0abce266820243789a8be8d56eb871c871d089ae15.exe 792 Trojan-Ransom.Win32.Shade.ptc-1463e3b4597e2a1e81b939713d8ccdbdf7a53a7077aaaaab466d83692429e982.exe 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe 1672 UDS-Trojan-Ransom.Win32.GandCrypt.a-3a84cd36849090c48212d6a2914bfba1d05ec98f1b245a0d268109c8d7a37d43.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe 1180 HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2584 taskmgr.exe 1200 Explorer.EXE -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 688 Trojan-Ransom.Win32.Foreign.nzfx-008c4bd6ee834d113cfc693af0ea90396eaa47e860bcdd567ffd964b57434e1d.exe 6748 svchost.exe 1456 Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2604 7zFM.exe Token: 35 2604 7zFM.exe Token: SeSecurityPrivilege 2604 7zFM.exe Token: SeDebugPrivilege 2584 taskmgr.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeDebugPrivilege 336 Trojan-Ransom.Win32.Agent.auwv-eda26a1cd80aac1c42cdbba9af813d9c4bc81f6052080bc33435d1e076e75aa0.exe Token: SeBackupPrivilege 336 Trojan-Ransom.Win32.Agent.auwv-eda26a1cd80aac1c42cdbba9af813d9c4bc81f6052080bc33435d1e076e75aa0.exe Token: SeRestorePrivilege 336 Trojan-Ransom.Win32.Agent.auwv-eda26a1cd80aac1c42cdbba9af813d9c4bc81f6052080bc33435d1e076e75aa0.exe Token: SeLockMemoryPrivilege 336 Trojan-Ransom.Win32.Agent.auwv-eda26a1cd80aac1c42cdbba9af813d9c4bc81f6052080bc33435d1e076e75aa0.exe Token: SeCreateGlobalPrivilege 336 Trojan-Ransom.Win32.Agent.auwv-eda26a1cd80aac1c42cdbba9af813d9c4bc81f6052080bc33435d1e076e75aa0.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeBackupPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeSecurityPrivilege 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe Token: SeDebugPrivilege 2668 Trojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exe Token: SeDebugPrivilege 3036 HEUR-Trojan-Ransom.MSIL.Blocker.gen-ad7fee685d2931a94b05f54ebe96ee1e49cb1dc9074c4af258f17b8a63292ffa.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2604 7zFM.exe 2604 7zFM.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1196 Trojan-Ransom.Win32.Shade.oxs-29a5959e44fa700ad6608d0abce266820243789a8be8d56eb871c871d089ae15.exe 1292 UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe 1196 Trojan-Ransom.Win32.Shade.oxs-29a5959e44fa700ad6608d0abce266820243789a8be8d56eb871c871d089ae15.exe 1084 Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe 1200 Explorer.EXE 1200 Explorer.EXE 6756 NOTEPAD.EXE 10396 Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 792 Trojan-Ransom.Win32.Shade.ptc-1463e3b4597e2a1e81b939713d8ccdbdf7a53a7077aaaaab466d83692429e982.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1092 wrote to memory of 3040 1092 cmd.exe 36 PID 1092 wrote to memory of 3040 1092 cmd.exe 36 PID 1092 wrote to memory of 3040 1092 cmd.exe 36 PID 3040 wrote to memory of 3036 3040 cmd.exe 37 PID 3040 wrote to memory of 3036 3040 cmd.exe 37 PID 3040 wrote to memory of 3036 3040 cmd.exe 37 PID 3040 wrote to memory of 3036 3040 cmd.exe 37 PID 3040 wrote to memory of 3048 3040 cmd.exe 38 PID 3040 wrote to memory of 3048 3040 cmd.exe 38 PID 3040 wrote to memory of 3048 3040 cmd.exe 38 PID 3040 wrote to memory of 3048 3040 cmd.exe 38 PID 3040 wrote to memory of 1180 3040 cmd.exe 39 PID 3040 wrote to memory of 1180 3040 cmd.exe 39 PID 3040 wrote to memory of 1180 3040 cmd.exe 39 PID 3040 wrote to memory of 1180 3040 cmd.exe 39 PID 3040 wrote to memory of 336 3040 cmd.exe 40 PID 3040 wrote to memory of 336 3040 cmd.exe 40 PID 3040 wrote to memory of 336 3040 cmd.exe 40 PID 3040 wrote to memory of 336 3040 cmd.exe 40 PID 3040 wrote to memory of 1380 3040 cmd.exe 41 PID 3040 wrote to memory of 1380 3040 cmd.exe 41 PID 3040 wrote to memory of 1380 3040 cmd.exe 41 PID 3040 wrote to memory of 1380 3040 cmd.exe 41 PID 3040 wrote to memory of 3064 3040 cmd.exe 42 PID 3040 wrote to memory of 3064 3040 cmd.exe 42 PID 3040 wrote to memory of 3064 3040 cmd.exe 42 PID 3040 wrote to memory of 2668 3040 cmd.exe 43 PID 3040 wrote to memory of 2668 3040 cmd.exe 43 PID 3040 wrote to memory of 2668 3040 cmd.exe 43 PID 3040 wrote to memory of 2668 3040 cmd.exe 43 PID 3040 wrote to memory of 2992 3040 cmd.exe 44 PID 3040 wrote to memory of 2992 3040 cmd.exe 44 PID 3040 wrote to memory of 2992 3040 cmd.exe 44 PID 3040 wrote to memory of 2992 3040 cmd.exe 44 PID 3040 wrote to memory of 2864 3040 cmd.exe 45 PID 3040 wrote to memory of 2864 3040 cmd.exe 45 PID 3040 wrote to memory of 2864 3040 cmd.exe 45 PID 3040 wrote to memory of 2864 3040 cmd.exe 45 PID 3040 wrote to memory of 2904 3040 cmd.exe 46 PID 3040 wrote to memory of 2904 3040 cmd.exe 46 PID 3040 wrote to memory of 2904 3040 cmd.exe 46 PID 3040 wrote to memory of 2904 3040 cmd.exe 46 PID 3040 wrote to memory of 3044 3040 cmd.exe 47 PID 3040 wrote to memory of 3044 3040 cmd.exe 47 PID 3040 wrote to memory of 3044 3040 cmd.exe 47 PID 3040 wrote to memory of 3044 3040 cmd.exe 47 PID 3040 wrote to memory of 3044 3040 cmd.exe 47 PID 3040 wrote to memory of 3044 3040 cmd.exe 47 PID 3040 wrote to memory of 3044 3040 cmd.exe 47 PID 3040 wrote to memory of 688 3040 cmd.exe 48 PID 3040 wrote to memory of 688 3040 cmd.exe 48 PID 3040 wrote to memory of 688 3040 cmd.exe 48 PID 3040 wrote to memory of 688 3040 cmd.exe 48 PID 3040 wrote to memory of 1084 3040 cmd.exe 49 PID 3040 wrote to memory of 1084 3040 cmd.exe 49 PID 3040 wrote to memory of 1084 3040 cmd.exe 49 PID 3040 wrote to memory of 1084 3040 cmd.exe 49 PID 3040 wrote to memory of 480 3040 cmd.exe 50 PID 3040 wrote to memory of 480 3040 cmd.exe 50 PID 3040 wrote to memory of 480 3040 cmd.exe 50 PID 3040 wrote to memory of 480 3040 cmd.exe 50 PID 3040 wrote to memory of 1456 3040 cmd.exe 51 PID 3040 wrote to memory of 1456 3040 cmd.exe 51 PID 3040 wrote to memory of 1456 3040 cmd.exe 51 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1200 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00364.7z"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2604
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2584
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\system32\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\Desktop\00364\HEUR-Trojan-Ransom.MSIL.Blocker.gen-ad7fee685d2931a94b05f54ebe96ee1e49cb1dc9074c4af258f17b8a63292ffa.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-ad7fee685d2931a94b05f54ebe96ee1e49cb1dc9074c4af258f17b8a63292ffa.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:3036 -
C:\Users\Admin\AppData\Roaming\Client.exe"C:\Users\Admin\AppData\Roaming\Client.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6464
-
-
-
C:\Users\Admin\Desktop\00364\HEUR-Trojan-Ransom.Win32.Encoder.gen-a1ac9a4b39d6282b6906e4a856d4a30d287572e9ff2d1943e3234d723ec76e1e.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-a1ac9a4b39d6282b6906e4a856d4a30d287572e9ff2d1943e3234d723ec76e1e.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3048
-
-
C:\Users\Admin\Desktop\00364\HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exeHEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe4⤵
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:1180 -
C:\Users\Admin\Desktop\00364\HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exeHEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe5⤵
- Executes dropped EXE
PID:2204
-
-
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Agent.auwv-eda26a1cd80aac1c42cdbba9af813d9c4bc81f6052080bc33435d1e076e75aa0.exeTrojan-Ransom.Win32.Agent.auwv-eda26a1cd80aac1c42cdbba9af813d9c4bc81f6052080bc33435d1e076e75aa0.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:336 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c move /y Trojan-Ransom.Win32.Agent.auwv-eda26a1cd80aac1c42cdbba9af813d9c4bc81f6052080bc33435d1e076e75aa0.exe C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe5⤵PID:608
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -m5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6584 -s 1847⤵
- Program crash
PID:4160
-
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6592 -s 1847⤵
- Program crash
PID:5548
-
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6600
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6608 -s 1847⤵
- Program crash
PID:2732
-
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6616
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6624 -s 1847⤵
- Program crash
PID:7872
-
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6632
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6640 -s 1847⤵
- Program crash
PID:2228
-
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6648 -s 1847⤵
- Program crash
PID:7360
-
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6656 -s 1847⤵
- Program crash
PID:4196
-
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12516
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:204
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:228
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10340
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10480
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10488
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10412
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10112
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6872
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9756
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10392
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10348
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10160
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11972
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6184
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8884
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10528
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10472
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9716
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11868
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8300
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11956
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12608
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7292
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12080
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7804
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6132
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11612
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6972
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9724
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10096
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7692
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5524
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6124
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5300
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6084
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5660
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6324
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11892
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10080
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12360
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9708
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10244
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10436
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10496
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8184
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6492
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10128
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10308
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8868
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8956
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8916
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8812
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8588
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8604
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8540
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8476
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8204
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7888
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7968
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7952
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8064
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7648
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7680
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7544
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5504
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12076
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5520
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11988
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6012
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6244
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11392
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4220
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7568
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6052
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4120
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5192
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5912
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5632
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11560
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6276
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6164
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6824
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11824
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6436
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7656
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9332
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9092
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5944
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11760
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:608
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8048
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6852
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11508
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11836
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12028
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12092
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12164
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8088
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8396
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8524
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8668
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8852
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9176
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6156
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5452
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7924
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5464
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3924
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11888
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12800
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5320
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8752
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6768
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12300
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12244
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12632
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11664
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11512
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11744
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11808
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11912
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12072
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:184
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:140
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12052
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5920
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12816
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6060
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6416
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9676
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9760
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11136
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10680
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6108
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10524
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12260
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11528
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:144
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7272
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6956
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9736
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6028
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11692
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7200
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6332
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12144
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5776
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5168
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7788
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3412
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7520
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7896
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7936
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8412
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8780
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9012
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5284
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5788
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12348
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12316
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12220
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12648
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12532
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12656
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11608
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11680
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11784
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11896
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12192
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:688
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11928
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5304
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9512
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8512
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10188
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5768
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3624
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4296
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9592
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9544
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9520
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10708
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:336
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12088
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11020
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7744
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6400
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9828
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10296
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12216
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12628
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4036
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12452
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11520
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9604
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11576
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5900
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5688
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11200
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9800
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11004
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10908
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11040
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11620
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10336
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10228
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10100
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11588
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12132
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12572
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10432
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5744
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9464
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7340
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10492
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11148
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11276
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5980
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5736
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11176
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11132
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10988
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10044
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10172
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11780
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10476
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5676
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11492
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11272
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13236
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12148
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10180
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9752
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11092
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4272
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8388
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11228
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7876
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11236
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11280
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8724
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8800
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11128
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12180
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12036
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11156
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7260
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5612
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6204
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13152
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13260
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9024
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8100
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9072
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8264
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11184
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7412
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:664
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9288
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6216
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8532
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13036
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8564
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8072
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7224
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6384
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6360
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6100
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5836
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8496
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7104
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6288
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5176
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1920
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11960
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11416
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5188
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9452
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8196
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7096
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9260
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4076
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11420
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11812
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3344
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11140
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8856
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8804
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5952
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7472
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13136
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13288
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8960
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8976
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8896
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8600
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8148
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9432
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5700
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1400
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8468
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6140
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7556
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11932
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12000
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12556
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9876
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11428
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3376
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11828
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7812
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8908
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8768
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8848
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3492
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9884
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8936
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7316
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5580
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11204
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9844
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10856
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6136
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12920
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7356
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11476
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9864
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8172
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11060
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9816
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10904
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9896
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9712
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10940
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10256
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9848
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8356
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4884
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12056
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5544
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12116
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11564
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3920
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12752
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9784
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8372
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9904
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3356
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12248
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11860
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12012
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11580
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7156
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13304
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9104
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8472
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8568
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7284
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8004
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7348
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12932
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6152
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5508
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8268
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7928
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7288
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7240
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6120
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5636
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11616
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6236
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5672
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12584
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13192
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5552
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12436
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12064
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12464
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8252
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4184
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6992
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7400
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5684
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3324
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6484
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5192
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7872
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5256
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5548
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5632
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3528
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12496
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5168
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12388
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6812
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12316
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12220
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12648
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12532
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11480
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11728
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11768
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5140
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11784
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12192
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11896
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11928
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:688
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5304
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9512
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9608
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11004
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9800
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11168
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9744
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5948
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10432
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11260
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11084
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11232
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7972
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7404
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8200
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8628
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12276
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11128
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11516
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7100
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9668
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9072
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8264
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11184
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10972
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11016
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11060
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7892
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8140
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11768
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2196
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10344
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12816
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5920
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12500
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:184
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:168
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11832
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11664
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11512
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3400
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12428
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4100
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6332
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6768
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:164
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11984
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7100
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6204
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9260
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11080
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6116
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9288
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:988
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7356
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10304
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11904
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9364
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5188
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11416
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6360
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5836
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6288
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9768
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11116
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9644
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10904
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10012
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10204
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12012
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12924
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13120
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6984
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12352
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6104
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12752
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3920
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10936
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11732
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10156
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6208
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9220
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5416
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11784
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6336
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8308
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6812
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11964
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8652
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12432
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10512
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8716
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:336
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12444
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9864
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5308
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11844
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8196
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8020
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11280
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6400
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12088
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5676
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7096
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11428
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6216
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13136
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11656
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1400
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10804
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8912
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11052
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7276
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13032
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5596
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8936
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7636
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11044
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12492
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11240
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10220
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10248
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5180
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9348
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12756
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10996
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13160
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8148
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5700
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12000
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3376
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13296
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8848
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3892
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7092
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7960
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12340
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10060
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9184
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6360
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13184
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10856
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10328
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12920
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12844
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9108
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3344
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7104
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9452
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11796
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11220
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10956
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11460
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10404
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11256
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11476
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4268
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8132
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5940
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8468
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5260
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7148
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11652
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3492
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8768
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11828
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12556
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6140
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8600
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7956
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5176
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11328
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11292
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11532
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9992
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11980
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10196
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10132
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9712
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10920
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11304
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10364
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11404
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12392
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10940
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10256
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10212
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12248
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7868
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11564
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7948
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10204
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12056
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11288
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10876
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10148
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6428
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6036
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10484
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11860
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7196
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7892
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10416
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3636
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10124
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3356
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6152
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5764
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8284
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7832
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12352
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6104
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12752
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10084
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10264
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12020
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7988
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7112
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6208
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13168
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7780
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9220
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10312
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12644
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3500
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8252
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8176
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12308
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12448
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8144
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8756
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8880
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12476
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6432
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6068
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5868
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12816
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:184
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11832
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11512
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3400
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12428
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6332
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12508
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12548
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9540
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6060
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11712
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8888
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11720
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12528
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11992
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6448
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7752
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:13192
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9180
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9360
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11584
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8040
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5436
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6768
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6172
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11784
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10816
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9244
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6352
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6812
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8288
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:288
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9536
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3280
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8440
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5812
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11624
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11816
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8384
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6204
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4076
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5144
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9676
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9760
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7632
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12416
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12640
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11344
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9888
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10160
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6252
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7352
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12484
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8012
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5884
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6420
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11868
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10052
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11180
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6760
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:200
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9808
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11908
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11956
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9408
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9436
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12608
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11668
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10144
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11612
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6132
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9156
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7692
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5212
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6124
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11156
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12412
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:12360
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10244
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10496
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8184
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10308
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9124
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:9856
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8956
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:6824
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8540
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7616
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11132
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7952
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7792
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:8220
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:7372
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:10288
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:11592
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud8720.exe -i Global\SM-yxugwjud -s6⤵PID:4952
-
-
-
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exeTrojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1380 -
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe"C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:10396
-
-
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Blocker.kxrk-43280933a686aa7b979590dc1d00f2119e2f59f40ef739340994b976a943e988.exeTrojan-Ransom.Win32.Blocker.kxrk-43280933a686aa7b979590dc1d00f2119e2f59f40ef739340994b976a943e988.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3064
-
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exeTrojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn SystemUpdate /tr "C:/ProgramData/SystemUpdate.exe" /sc hourly /F5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:9644
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn DriversUpdate /tr "C:\Users\Admin/AppData/Local/Temp/SystemDebug.exe" /sc hourly /F5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3088
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn WinUrll /tr "C:\Users\Admin/AppData/Local/Temp/WinSys.exe" /sc hourly /F5⤵
- Scheduled Task/Job: Scheduled Task
PID:8340
-
-
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exeTrojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2992 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1780
-
C:\Windows\system32\mode.commode con cp select=12516⤵PID:3888
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:2752
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:9840
-
-
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Cryakl.ase-bbcdfd57739dab2c4d1ea6e3e209a4b829f200e7bbc9cc78b616e9b358880ebe.exeTrojan-Ransom.Win32.Cryakl.ase-bbcdfd57739dab2c4d1ea6e3e209a4b829f200e7bbc9cc78b616e9b358880ebe.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2864 -
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Cryakl.ase-bbcdfd57739dab2c4d1ea6e3e209a4b829f200e7bbc9cc78b616e9b358880ebe.exe"C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Cryakl.ase-bbcdfd57739dab2c4d1ea6e3e209a4b829f200e7bbc9cc78b616e9b358880ebe.exe"5⤵
- Executes dropped EXE
PID:3236
-
-
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exeTrojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe4⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2904
-
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Foreign.njmq-36fa3541feafc5b08b7c8a335e8c9f79a4f87aaf7a2a86fea387944c0f0ebec1.exeTrojan-Ransom.Win32.Foreign.njmq-36fa3541feafc5b08b7c8a335e8c9f79a4f87aaf7a2a86fea387944c0f0ebec1.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3044
-
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Foreign.nzfx-008c4bd6ee834d113cfc693af0ea90396eaa47e860bcdd567ffd964b57434e1d.exeTrojan-Ransom.Win32.Foreign.nzfx-008c4bd6ee834d113cfc693af0ea90396eaa47e860bcdd567ffd964b57434e1d.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:688 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:6748
-
-
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exeTrojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe4⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete5⤵
- System Location Discovery: System Language Discovery
PID:3168
-
-
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Jaff.bg-dd15ec17e469159196a0853bf14edb45a86054c71bc555e2cd0afc1c410917b2.exeTrojan-Ransom.Win32.Jaff.bg-dd15ec17e469159196a0853bf14edb45a86054c71bc555e2cd0afc1c410917b2.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:480
-
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exeTrojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1456 -
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe"C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe" g5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7152
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "QH6IGF1f" /TR "C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe" /SC ONLOGON /RL HIGHEST /F5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4172
-
-
C:\Windows\syswow64\explorer.exe"C:\Windows\syswow64\explorer.exe"5⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
PID:9852
-
-
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Shade.oxs-29a5959e44fa700ad6608d0abce266820243789a8be8d56eb871c871d089ae15.exeTrojan-Ransom.Win32.Shade.oxs-29a5959e44fa700ad6608d0abce266820243789a8be8d56eb871c871d089ae15.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1196
-
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Shade.ptc-1463e3b4597e2a1e81b939713d8ccdbdf7a53a7077aaaaab466d83692429e982.exeTrojan-Ransom.Win32.Shade.ptc-1463e3b4597e2a1e81b939713d8ccdbdf7a53a7077aaaaab466d83692429e982.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of UnmapMainImage
PID:792
-
-
C:\Users\Admin\Desktop\00364\UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exeUDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1292 -
C:\Users\Admin\Desktop\00364\UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exeDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9804
-
-
-
C:\Users\Admin\Desktop\00364\UDS-Trojan-Ransom.Win32.GandCrypt.a-3a84cd36849090c48212d6a2914bfba1d05ec98f1b245a0d268109c8d7a37d43.exeUDS-Trojan-Ransom.Win32.GandCrypt.a-3a84cd36849090c48212d6a2914bfba1d05ec98f1b245a0d268109c8d7a37d43.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 1245⤵
- Loads dropped DLL
- Program crash
PID:1392
-
-
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\README_LOCKED.txt2⤵
- Loads dropped DLL
- Modifies registry class
- Opens file in notepad (likely ransom note)
- Suspicious use of SetWindowsHookEx
PID:6756
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\EC78.bi1"2⤵PID:10900
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:13192
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\EC78.bi1"2⤵PID:4836
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:11308
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5096
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
3Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPlusWW.msi.id-C99F91CB.[[email protected]].com
Filesize24.4MB
MD584761100a6988b144d2f8d746bc165a5
SHA1a874a443828a158c2b7a58f8569ce3e884ff7952
SHA256f3678207ed44018bcbbd189c3a7e3058ce747878ccdd4971c6b2aa0d2296dcbe
SHA512727d70f8645705314d5be0f8cfe6d46545cdb41c3ec0596941c90457e913463f2a34ca85e47397f32248ca8650dd492b1e36f46f9215c7755b06a24ce2d1e56a
-
Filesize
543B
MD587644ff73bafa826e713b2e5b42ed464
SHA1d06a50a6bd6a3c7e7a7ad435f0e1ae3c1497e551
SHA2562339661a8ae9412dc0828b457b9e834e169234da9aff77a8546f2f9186f480c6
SHA5128385402e38e1bc3b259f5317f49eff1db94be18a6646c566028be2608de3f89ddb27b430fc50aa645bda7c3694984d8dcbadeac52a919549b32647abd2316051
-
Filesize
3.5MB
MD5438a7bae3cfb08f4da435fe0f6002d5a
SHA1b9bfe43cee9f764766350e94e7f8d7d8cde4d112
SHA25640f4986aa3d812d435aea6b10cc7d7f01e87623805062692631698378a27721c
SHA512f2b741aaee44142f10b97de97f5e8eb258b753703318f6dc272ffff0bfeb3a893583e2b53efb73f0ec57715f2f133df7938f58aeb1b68857943bbab78c1516cc
-
Filesize
8KB
MD54d81ab636f7ea2f9e6f8d3d13d3b1785
SHA129a40a94a7f36c3fdae6b6465970f9cd41b371d3
SHA256332e08567da2a6697fa70a742f5d30c18834e1dcc05fa0e5d926533d26ec2cd5
SHA512eb7c02d5d8c8d3710ec99b6dad288b131ecf49ec7ff5ecafe608d95ea3fec9a7b00f849ffeefda54b2b2d33d3b87e532468f2e3451dff5a1943c6a5a64bd4395
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
142KB
MD59c43f77cb7cff27cb47ed67babe3eda5
SHA1b0400cf68249369d21de86bd26bb84ccffd47c43
SHA256f25b9288fe370dcfcb4823fb4e44ab88c7f5fce6e137d0dba389a3dba07d621e
SHA512cde6fb6cf8db6f9746e69e6c10214e60b3646700d70b49668a2a792e309714dd2d4c5a5241977a833a95fcde8318abcc89eb9968a5039a0b75726bbfa27125a7
-
C:\Users\Admin\Desktop\00364\HEUR-Trojan-Ransom.MSIL.Blocker.gen-ad7fee685d2931a94b05f54ebe96ee1e49cb1dc9074c4af258f17b8a63292ffa.exe
Filesize197KB
MD50197e5f8843325664b861cf881c7c9f2
SHA1cadd29937de1bb1e7248126e5a59e502a70ce083
SHA256ad7fee685d2931a94b05f54ebe96ee1e49cb1dc9074c4af258f17b8a63292ffa
SHA5128ccc82dd05f8c389125672ab470248f954de907b53641ef40961f6e59c1a42970a44bcf65036ca77020df79a9044ce49b90525fbd2bb4bce683b7fa92bee7213
-
C:\Users\Admin\Desktop\00364\HEUR-Trojan-Ransom.Win32.Encoder.gen-a1ac9a4b39d6282b6906e4a856d4a30d287572e9ff2d1943e3234d723ec76e1e.exe
Filesize201KB
MD599fd90fc0be359e150ccf90611d60e07
SHA133a992e6af7b0847dca882199fcbc5eaba442920
SHA256a1ac9a4b39d6282b6906e4a856d4a30d287572e9ff2d1943e3234d723ec76e1e
SHA512ccda4c25991443526c33d5213f2e69ba85e3ce036794d7f92b4ce4e23c4c17d7398afbcfdc892aac8b52687020336d162471a026311e0a329869c8dd2e47a697
-
C:\Users\Admin\Desktop\00364\HEUR-Trojan-Ransom.Win32.Generic-58e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37.exe
Filesize135KB
MD57b9e791ad016e85a450c8e87e4a87751
SHA11c3c11a8dc1b1c3844f3909fb908aee32e3708a1
SHA25658e75533da432d0133df7ad76bce1da9356853403b280aa549fbe94cd2cf3e37
SHA512b19fdb4706b9077a9e0244204bcb728826be92001cf12d88b2ce79027980fa6452400c7651c001463aaefdc1d482f1a70019a1f3eb5a091eed43cf1357fb6bc2
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Agent.auwv-eda26a1cd80aac1c42cdbba9af813d9c4bc81f6052080bc33435d1e076e75aa0.exe
Filesize1.2MB
MD516bcc3b7f32c41e7c7222bf37fe39fe6
SHA1a25bc5442c86bdeb0dec6583f0e80e241745fb73
SHA256eda26a1cd80aac1c42cdbba9af813d9c4bc81f6052080bc33435d1e076e75aa0
SHA512f3e7087f569b3bcc201c006c5dfcea6cf560cad480bc03e6f17790190bc35bf6659e91a9f91219952bd139a3c9afde961032ee1d0861158409206feaa6540f9e
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Blocker.kkwc-29fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401.exe
Filesize3.9MB
MD5a0c27c24aa449c7faeb7d971a05f2577
SHA1a331e918ea7825b0ccf128972b9e5f20e6e47582
SHA25629fe5871a6d2ccb179f707279e2d45d4625e01494f67321db3041222211a6401
SHA5129aa96051e59c3ab94b6d4c84c44c1cc63ffb8ef4b625e726551a204bd658b48bdf8ffada5277a9f5d1cd0c76fb004859daa0200e9fcb0c5cdac03cced43cfeb2
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Blocker.kxrk-43280933a686aa7b979590dc1d00f2119e2f59f40ef739340994b976a943e988.exe
Filesize4.6MB
MD5ac7533164c7070ee995375f6393cc819
SHA1fe77b84bfd7506f84cfc4c9cde9235bc3f87c2b3
SHA25643280933a686aa7b979590dc1d00f2119e2f59f40ef739340994b976a943e988
SHA512f5ffac7448fcdb857060b0e81b821ca2f98c57f80906c93d3ddc643cf579a6c337031ad90af230d34cfe87ce030d2a78b5e5818f9f7014bf986c187d212b1f20
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Crusis.cya-553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737.exe
Filesize2.1MB
MD51ec3886fe931ac47525500c8a0e0e7f5
SHA116f98fceb4526236f84263a995cfcdb965793dbe
SHA256553670cd0f3ad52b4e8021e3b03715c7e052ccc487f26fa5e09e0abdd61ed737
SHA5124f300692cfd1d7abe6c2f8efee5bf86b2574381dba5eccbaa7518054af34206b0d6633526215b8eb8c8548af5b233e7a7a5a5ef2e2a3c8ed07d61acd665e1eb2
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Crusis.to-e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691.exe
Filesize92KB
MD536bb266bed87509e931b4db1439d5328
SHA1724a8327b9e7d88663e8b8e2c04db41d803e2db4
SHA256e823c4517a61f14329c918f23f66ccd704d7a3107af90b949864b9e3578c3691
SHA5126a7aa6de93303ba9757f0ec8a003f25f1ae2a421d6ff573629332300a78f277c55a8dc331c776d431d244c8d35a95c5c71d7d5b9c63b221b068dcd362bb5d45c
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Cryakl.ase-bbcdfd57739dab2c4d1ea6e3e209a4b829f200e7bbc9cc78b616e9b358880ebe.exe
Filesize170KB
MD50ff29c048fa497e7616fa42ee44f85ad
SHA1e426fca052f9788e17929a8de8191cb2b1e54132
SHA256bbcdfd57739dab2c4d1ea6e3e209a4b829f200e7bbc9cc78b616e9b358880ebe
SHA51258171305363a7686d33fca85e3c0359a92474710232ed8804a1e3314a8e06a6f0e1cc660714f3072595fdc3e11af0ab254b1f071f8c308b9c966465e8c27f9ff
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Crypmod.acdg-e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733.exe
Filesize176KB
MD551911d84e794b1bdc8d6412664fbb3c4
SHA1a6a899ef5f39e66a7103daa2cf1599830505de16
SHA256e2d677c2b61a594263b621ec1aa18ac3f056e2a85c4db608e30331076153d733
SHA51233dba0d7b1f36a018a8c048ffdde15aba0d0866c1f732aaddeb79a96102e3f7a73ff41b3c3939d1d113d6f370a21d06eebec1bb73c5c29b3f817fa0c4cbedefa
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Foreign.njmq-36fa3541feafc5b08b7c8a335e8c9f79a4f87aaf7a2a86fea387944c0f0ebec1.exe
Filesize608KB
MD5e8a7b0ecfbe0cf34a756ba29de5f75f2
SHA1a9629701e24eb0432ace531a94250e1be6fd78d1
SHA25636fa3541feafc5b08b7c8a335e8c9f79a4f87aaf7a2a86fea387944c0f0ebec1
SHA51252da1aa68df3c5ac4a98f4bf1550cef0335133506235191b340fca104ee860f3f8b9e44bc1997374a7cd5d6031a6819db157072df58d964c86c2dd055848a8a8
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Foreign.nzfx-008c4bd6ee834d113cfc693af0ea90396eaa47e860bcdd567ffd964b57434e1d.exe
Filesize442KB
MD5e6d118192fc848797e15dc0600834783
SHA116d5ded68677f4a870423d3fd30da8377a5b2408
SHA256008c4bd6ee834d113cfc693af0ea90396eaa47e860bcdd567ffd964b57434e1d
SHA512872b50145bd84646a402558e65894c499a7340248e94e672a10009d2c55d03a0fab93a2dcca3b88163293adc9dffde5bfbec1fb0b33e78a6daed968b0d2fa88c
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.GandCrypt.fdo-20e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1.exe
Filesize632KB
MD5e0ce6413abe8bdd2a0f8ef5e6db56593
SHA1cadbd5af2d5f23fae9c3f2077e9d90596c5b03ca
SHA25620e5579816531f06b14d2418b0d1191776f14032e2381152aaf1f76402afddf1
SHA51226d4283d05f4e4d7c8de61578551183e5fc65963a2f681156aa06721f306ca878b6839ad95a22d353020e37dbde4ab635d0f9be6e2d2df5ae805a05839cd5bb1
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Jaff.bg-dd15ec17e469159196a0853bf14edb45a86054c71bc555e2cd0afc1c410917b2.exe
Filesize210KB
MD5dea5cd9dcf444d6107b14cabefbb1774
SHA169d5094172cc962acec44fcee4db19204a556009
SHA256dd15ec17e469159196a0853bf14edb45a86054c71bc555e2cd0afc1c410917b2
SHA5120597daaaf40d7a65389b126b5f8fefc4fa586758e98ba103c9599f4c8a5fd39f74e8b2710b3862cf7f70437f273c2caa5aef59bc93ae9aeb01c8141b279ae584
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.SageCrypt.eiz-f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599.exe
Filesize500KB
MD5b068c6c4417d98d0eac222902c95c9dc
SHA1416e7bfe0fc5017ed5132b7e24036c918cb3b7b6
SHA256f02a820fc980edc17befb9cd2d685bacec9ca0e2b083881db28d7087463ec599
SHA512178a56a327d431a922cf56b25236977fbdb59fd941701421e60745708a412cf00c16241d8bdd147579aae746dd0f4fac76cc9c40778f2568a8ef51cd80c74afe
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Shade.oxs-29a5959e44fa700ad6608d0abce266820243789a8be8d56eb871c871d089ae15.exe
Filesize1.4MB
MD570833b6c205acf72ed0290506a7dd77b
SHA146a2e7840ecf976356ccfc7dbb99aa1ea4267f91
SHA25629a5959e44fa700ad6608d0abce266820243789a8be8d56eb871c871d089ae15
SHA512c5fd20c1433f5a33f4d82c1d67598e52fbecf71e7907f15ff1bee9c6d4a75cae737c6ca429cb2614bff21b277831da92a432db3277cbdeb7d3056492fe4be81f
-
C:\Users\Admin\Desktop\00364\Trojan-Ransom.Win32.Shade.ptc-1463e3b4597e2a1e81b939713d8ccdbdf7a53a7077aaaaab466d83692429e982.exe
Filesize1.2MB
MD57288d113b95d76bdb5e80040fcded9a4
SHA1c7ca2943050173c417d527100d41e8ac93580a8c
SHA2561463e3b4597e2a1e81b939713d8ccdbdf7a53a7077aaaaab466d83692429e982
SHA5126488505a784e2ca80ce2717d302577fa32135a8fc566ffaf45216ce4c904340508badbb0e876d55765898d5271674ef191438389ddcdc86db8a549aaeced2cc1
-
C:\Users\Admin\Desktop\00364\UDS-Trojan-Ransom.Win32.Blocker.gen-89ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e.exe
Filesize753KB
MD567637014f37d61ae3702983dc71fda1a
SHA174565447a9f110660e42a9e721a0d1797d52707e
SHA25689ba18478e43173cb8b5ef0aad17cc50988ccfc9c788c3f5eb2b6b5137fbc15e
SHA512c8548ed6d3ee85951fa12568b8c0d9fff019cb29e2b7aa05f0c572d85db26db069db2274ec51c168c90e59bb01708acf472ddb9cb373298a13d3d0985a3fac2b
-
C:\Users\Admin\Desktop\00364\UDS-Trojan-Ransom.Win32.GandCrypt.a-3a84cd36849090c48212d6a2914bfba1d05ec98f1b245a0d268109c8d7a37d43.exe
Filesize69KB
MD51ff3690fe677b47c2f5b4051b422c4fc
SHA170736d74dd8bd5b1453319eb73f0dbc2e21e530b
SHA2563a84cd36849090c48212d6a2914bfba1d05ec98f1b245a0d268109c8d7a37d43
SHA5126dcd6afcdc12bf84fa81aea3b9d395e487828d6eda669d2cabd459acb8438ae908e234a5af963253c4dfb086b9dbed987a09de28b28bff66c061ae1e7479d435
-
Filesize
1KB
MD5bf41f65f8a5b7c27752368238ea18595
SHA14bbe26657dbfc8d5e57d2dbcf3d7f987094a8dbb
SHA256544779e2ee93f79d33708e37f1b07817d5427f70895ce9c440125f2631acdf53
SHA5123864ff7d0cd5e9f3c8425da83970d0e27b9e97c6d32b6159b6330367f1fa0daca2d1b2d169f417563827440020c99e983d6166b3aec845720140fc4ac3674335
-
Filesize
282B
MD5f69b98b8ecc1e99bd32cd80cd3894e22
SHA18e1ee14fbef543f9ae6452d3ae03cf2395acc706
SHA25643c5734b1b8be56d91a0a639c9ed02facfe81ca7a3334b3010f12396046bb45b
SHA512410306fec05480e84f87648d21bad5cdd0ee6cdefc01dd60a9043680754b4525fd49e32956575e6649dc2f6b4b167ac661da043f9983cc7c133e7ee3a2894aab
-
Filesize
8KB
MD5210d41b5cac1a50eec2f419323fa919d
SHA1f0645454094c28dbf8b72f56a65d373c204ae41e
SHA256b726529b8054e8992ded19200130e9d0ada74c652b0f7a357a0b2ceba189e29d
SHA5123925d5faed78c8320adec8dedddcdec94ec1a5f4339e4b9d6a48d1415bfba5d88cd3348e13309207f440df2b5e4c43f31d0e5aeed8bdc70e21b22ed91b3172e5
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a