Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
31/01/2025, 01:30
Behavioral task
behavioral1
Sample
2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win10v2004-20250129-en
General
-
Target
2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
6.0MB
-
MD5
5e08c240f61bf21310b6ec5b503c4711
-
SHA1
23effe95fb665f8c3067c01569489366307e2ead
-
SHA256
110b535501a888b8f76a16bb6fca0d4470d3d610bdc9b8972c2f60b5c4df2719
-
SHA512
87a18115bc07b9bfee978cefae7e13ec91d40f28e5796e5afcadaaacdb6e83cfb7344f2d80133543d209d1383ed7e4fa58414fdf8de557c16d442de08d172ca2
-
SSDEEP
98304:oemTLkNdfE0pZrD56utgpPFotBER/mQ32lU2:T+q56utgpPF8u/72
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 33 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral2/files/0x000c000000023b10-4.dat cobalt_reflective_dll behavioral2/files/0x000b000000023b75-11.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b77-21.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b7b-39.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b7a-50.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b7e-64.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b7d-61.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b7c-59.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b78-41.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b79-37.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b76-24.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b7f-70.dat cobalt_reflective_dll behavioral2/files/0x000b000000023b73-79.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b80-83.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b81-95.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b84-108.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b85-116.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b87-126.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b89-136.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b88-134.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b86-124.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b83-109.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b8f-178.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b90-192.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b91-194.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b93-205.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b92-202.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b8e-187.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b8d-185.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b8c-155.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b8b-153.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b8a-151.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b82-97.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
Xmrig family
-
XMRig Miner payload 64 IoCs
resource yara_rule behavioral2/memory/4256-0-0x00007FF688420000-0x00007FF688774000-memory.dmp xmrig behavioral2/files/0x000c000000023b10-4.dat xmrig behavioral2/memory/3656-7-0x00007FF7A8FD0000-0x00007FF7A9324000-memory.dmp xmrig behavioral2/files/0x000b000000023b75-11.dat xmrig behavioral2/memory/4652-13-0x00007FF618440000-0x00007FF618794000-memory.dmp xmrig behavioral2/files/0x000a000000023b77-21.dat xmrig behavioral2/files/0x000a000000023b7b-39.dat xmrig behavioral2/files/0x000a000000023b7a-50.dat xmrig behavioral2/memory/3216-58-0x00007FF786B30000-0x00007FF786E84000-memory.dmp xmrig behavioral2/memory/1600-63-0x00007FF758F20000-0x00007FF759274000-memory.dmp xmrig behavioral2/memory/3704-67-0x00007FF6DAFC0000-0x00007FF6DB314000-memory.dmp xmrig behavioral2/memory/3352-68-0x00007FF7A7EE0000-0x00007FF7A8234000-memory.dmp xmrig behavioral2/memory/5048-66-0x00007FF687BD0000-0x00007FF687F24000-memory.dmp xmrig behavioral2/files/0x000a000000023b7e-64.dat xmrig behavioral2/files/0x000a000000023b7d-61.dat xmrig behavioral2/files/0x000a000000023b7c-59.dat xmrig behavioral2/memory/1928-56-0x00007FF73E1D0000-0x00007FF73E524000-memory.dmp xmrig behavioral2/memory/3948-45-0x00007FF68E6F0000-0x00007FF68EA44000-memory.dmp xmrig behavioral2/files/0x000a000000023b78-41.dat xmrig behavioral2/files/0x000a000000023b79-37.dat xmrig behavioral2/memory/2500-34-0x00007FF630C00000-0x00007FF630F54000-memory.dmp xmrig behavioral2/files/0x000a000000023b76-24.dat xmrig behavioral2/memory/4576-20-0x00007FF725C00000-0x00007FF725F54000-memory.dmp xmrig behavioral2/files/0x000a000000023b7f-70.dat xmrig behavioral2/memory/720-72-0x00007FF783520000-0x00007FF783874000-memory.dmp xmrig behavioral2/memory/3136-78-0x00007FF6CA6C0000-0x00007FF6CAA14000-memory.dmp xmrig behavioral2/files/0x000b000000023b73-79.dat xmrig behavioral2/files/0x000a000000023b80-83.dat xmrig behavioral2/memory/3152-84-0x00007FF6FEAF0000-0x00007FF6FEE44000-memory.dmp xmrig behavioral2/memory/4256-89-0x00007FF688420000-0x00007FF688774000-memory.dmp xmrig behavioral2/files/0x000a000000023b81-95.dat xmrig behavioral2/memory/4652-103-0x00007FF618440000-0x00007FF618794000-memory.dmp xmrig behavioral2/files/0x000a000000023b84-108.dat xmrig behavioral2/files/0x000a000000023b85-116.dat xmrig behavioral2/files/0x000a000000023b87-126.dat xmrig behavioral2/files/0x000a000000023b89-136.dat xmrig behavioral2/files/0x000a000000023b88-134.dat xmrig behavioral2/files/0x000a000000023b86-124.dat xmrig behavioral2/files/0x000a000000023b83-109.dat xmrig behavioral2/memory/4576-105-0x00007FF725C00000-0x00007FF725F54000-memory.dmp xmrig behavioral2/memory/4240-101-0x00007FF7FB230000-0x00007FF7FB584000-memory.dmp xmrig behavioral2/memory/3656-99-0x00007FF7A8FD0000-0x00007FF7A9324000-memory.dmp xmrig behavioral2/memory/2412-148-0x00007FF73C690000-0x00007FF73C9E4000-memory.dmp xmrig behavioral2/memory/628-157-0x00007FF62E010000-0x00007FF62E364000-memory.dmp xmrig behavioral2/memory/1652-159-0x00007FF6F5E70000-0x00007FF6F61C4000-memory.dmp xmrig behavioral2/memory/1716-165-0x00007FF6FFC70000-0x00007FF6FFFC4000-memory.dmp xmrig behavioral2/memory/3644-164-0x00007FF715BB0000-0x00007FF715F04000-memory.dmp xmrig behavioral2/memory/1928-163-0x00007FF73E1D0000-0x00007FF73E524000-memory.dmp xmrig behavioral2/memory/3948-162-0x00007FF68E6F0000-0x00007FF68EA44000-memory.dmp xmrig behavioral2/memory/2500-161-0x00007FF630C00000-0x00007FF630F54000-memory.dmp xmrig behavioral2/files/0x000a000000023b8f-178.dat xmrig behavioral2/files/0x000a000000023b90-192.dat xmrig behavioral2/files/0x000a000000023b91-194.dat xmrig behavioral2/files/0x000a000000023b93-205.dat xmrig behavioral2/files/0x000a000000023b92-202.dat xmrig behavioral2/memory/2360-191-0x00007FF6E2300000-0x00007FF6E2654000-memory.dmp xmrig behavioral2/files/0x000a000000023b8e-187.dat xmrig behavioral2/files/0x000a000000023b8d-185.dat xmrig behavioral2/memory/2348-184-0x00007FF782E40000-0x00007FF783194000-memory.dmp xmrig behavioral2/memory/2612-183-0x00007FF7B0530000-0x00007FF7B0884000-memory.dmp xmrig behavioral2/memory/1600-180-0x00007FF758F20000-0x00007FF759274000-memory.dmp xmrig behavioral2/memory/3216-179-0x00007FF786B30000-0x00007FF786E84000-memory.dmp xmrig behavioral2/memory/3992-160-0x00007FF771BF0000-0x00007FF771F44000-memory.dmp xmrig behavioral2/memory/4460-158-0x00007FF6038B0000-0x00007FF603C04000-memory.dmp xmrig -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 64 IoCs
pid Process 3656 lvyRWYa.exe 4652 bDOrzEP.exe 4576 YXfDknq.exe 2500 bPBoVXx.exe 5048 JDYtVCl.exe 3948 XrlEKig.exe 3704 sClAqEI.exe 1928 tadoUKj.exe 3352 nQyAEuj.exe 3216 KIjYmYU.exe 1600 fijAKUX.exe 720 qUYYHOo.exe 3136 LJrUvaA.exe 3152 QeadGRB.exe 2376 SIGTwMG.exe 4240 oENfJDM.exe 2036 NoXfDlL.exe 3644 QzaIXKw.exe 2412 pqeqcUn.exe 4052 NupiCVe.exe 4896 TKYTEeP.exe 628 RBRAQqX.exe 4460 EznDYpL.exe 1652 ONYKAam.exe 1716 QFkDddX.exe 3992 PilcIjz.exe 2612 wfBUYdY.exe 2348 KiHIpHR.exe 2360 SGKzZkH.exe 1060 nGsfEeV.exe 2796 DtpxTWo.exe 4252 hVUAXTz.exe 4704 rFkYPrV.exe 3996 EMjjHph.exe 4936 ZRQCYGk.exe 1700 MYrnWfP.exe 1808 sxQhsPK.exe 536 tazaQDH.exe 3900 uSnfNvy.exe 5068 QdJGrwj.exe 3420 WBonQZv.exe 4844 FVAdtAJ.exe 4876 NHqyVMA.exe 4760 BgUVeZk.exe 4000 ukLImJj.exe 3684 uxgdTXR.exe 3952 zWPMcUL.exe 3028 VjweXAo.exe 1540 tXDmTJk.exe 2216 RhliUML.exe 4780 qauQKdT.exe 1376 xAfigDA.exe 2808 yjZnzFx.exe 2020 eBdiiEt.exe 4320 SOEtEXc.exe 4904 tIvjEaX.exe 2480 skgjTZr.exe 1936 dMoJjgb.exe 744 YuIZOnh.exe 464 DjAyxQZ.exe 3928 dRQFtNO.exe 1536 XlBpFzP.exe 4684 vPxTGXo.exe 4336 NqFSFXs.exe -
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe -
resource yara_rule behavioral2/memory/4256-0-0x00007FF688420000-0x00007FF688774000-memory.dmp upx behavioral2/files/0x000c000000023b10-4.dat upx behavioral2/memory/3656-7-0x00007FF7A8FD0000-0x00007FF7A9324000-memory.dmp upx behavioral2/files/0x000b000000023b75-11.dat upx behavioral2/memory/4652-13-0x00007FF618440000-0x00007FF618794000-memory.dmp upx behavioral2/files/0x000a000000023b77-21.dat upx behavioral2/files/0x000a000000023b7b-39.dat upx behavioral2/files/0x000a000000023b7a-50.dat upx behavioral2/memory/3216-58-0x00007FF786B30000-0x00007FF786E84000-memory.dmp upx behavioral2/memory/1600-63-0x00007FF758F20000-0x00007FF759274000-memory.dmp upx behavioral2/memory/3704-67-0x00007FF6DAFC0000-0x00007FF6DB314000-memory.dmp upx behavioral2/memory/3352-68-0x00007FF7A7EE0000-0x00007FF7A8234000-memory.dmp upx behavioral2/memory/5048-66-0x00007FF687BD0000-0x00007FF687F24000-memory.dmp upx behavioral2/files/0x000a000000023b7e-64.dat upx behavioral2/files/0x000a000000023b7d-61.dat upx behavioral2/files/0x000a000000023b7c-59.dat upx behavioral2/memory/1928-56-0x00007FF73E1D0000-0x00007FF73E524000-memory.dmp upx behavioral2/memory/3948-45-0x00007FF68E6F0000-0x00007FF68EA44000-memory.dmp upx behavioral2/files/0x000a000000023b78-41.dat upx behavioral2/files/0x000a000000023b79-37.dat upx behavioral2/memory/2500-34-0x00007FF630C00000-0x00007FF630F54000-memory.dmp upx behavioral2/files/0x000a000000023b76-24.dat upx behavioral2/memory/4576-20-0x00007FF725C00000-0x00007FF725F54000-memory.dmp upx behavioral2/files/0x000a000000023b7f-70.dat upx behavioral2/memory/720-72-0x00007FF783520000-0x00007FF783874000-memory.dmp upx behavioral2/memory/3136-78-0x00007FF6CA6C0000-0x00007FF6CAA14000-memory.dmp upx behavioral2/files/0x000b000000023b73-79.dat upx behavioral2/files/0x000a000000023b80-83.dat upx behavioral2/memory/3152-84-0x00007FF6FEAF0000-0x00007FF6FEE44000-memory.dmp upx behavioral2/memory/4256-89-0x00007FF688420000-0x00007FF688774000-memory.dmp upx behavioral2/files/0x000a000000023b81-95.dat upx behavioral2/memory/4652-103-0x00007FF618440000-0x00007FF618794000-memory.dmp upx behavioral2/files/0x000a000000023b84-108.dat upx behavioral2/files/0x000a000000023b85-116.dat upx behavioral2/files/0x000a000000023b87-126.dat upx behavioral2/files/0x000a000000023b89-136.dat upx behavioral2/files/0x000a000000023b88-134.dat upx behavioral2/files/0x000a000000023b86-124.dat upx behavioral2/files/0x000a000000023b83-109.dat upx behavioral2/memory/4576-105-0x00007FF725C00000-0x00007FF725F54000-memory.dmp upx behavioral2/memory/4240-101-0x00007FF7FB230000-0x00007FF7FB584000-memory.dmp upx behavioral2/memory/3656-99-0x00007FF7A8FD0000-0x00007FF7A9324000-memory.dmp upx behavioral2/memory/2412-148-0x00007FF73C690000-0x00007FF73C9E4000-memory.dmp upx behavioral2/memory/628-157-0x00007FF62E010000-0x00007FF62E364000-memory.dmp upx behavioral2/memory/1652-159-0x00007FF6F5E70000-0x00007FF6F61C4000-memory.dmp upx behavioral2/memory/1716-165-0x00007FF6FFC70000-0x00007FF6FFFC4000-memory.dmp upx behavioral2/memory/3644-164-0x00007FF715BB0000-0x00007FF715F04000-memory.dmp upx behavioral2/memory/1928-163-0x00007FF73E1D0000-0x00007FF73E524000-memory.dmp upx behavioral2/memory/3948-162-0x00007FF68E6F0000-0x00007FF68EA44000-memory.dmp upx behavioral2/memory/2500-161-0x00007FF630C00000-0x00007FF630F54000-memory.dmp upx behavioral2/files/0x000a000000023b8f-178.dat upx behavioral2/files/0x000a000000023b90-192.dat upx behavioral2/files/0x000a000000023b91-194.dat upx behavioral2/files/0x000a000000023b93-205.dat upx behavioral2/files/0x000a000000023b92-202.dat upx behavioral2/memory/2360-191-0x00007FF6E2300000-0x00007FF6E2654000-memory.dmp upx behavioral2/files/0x000a000000023b8e-187.dat upx behavioral2/files/0x000a000000023b8d-185.dat upx behavioral2/memory/2348-184-0x00007FF782E40000-0x00007FF783194000-memory.dmp upx behavioral2/memory/2612-183-0x00007FF7B0530000-0x00007FF7B0884000-memory.dmp upx behavioral2/memory/1600-180-0x00007FF758F20000-0x00007FF759274000-memory.dmp upx behavioral2/memory/3216-179-0x00007FF786B30000-0x00007FF786E84000-memory.dmp upx behavioral2/memory/3992-160-0x00007FF771BF0000-0x00007FF771F44000-memory.dmp upx behavioral2/memory/4460-158-0x00007FF6038B0000-0x00007FF603C04000-memory.dmp upx -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\System\mgNQxdX.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\btRRvsk.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\EERrkcb.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\MKcFHkp.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\TAeyhlk.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\IcJSelZ.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ySxmlqw.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\enVEvxu.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\WQYiwir.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kYsSaYe.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\QWkmlyt.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\OYRWFVV.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\YXfDknq.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\gihFYIS.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\rQSczKp.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\cJkcKbo.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\yrDkZzU.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DFNdyvw.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VKbGZlT.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ElfXgDQ.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\NAyacQv.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\qUMfuXn.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\AcSxRqt.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\QWWezgJ.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DJZjtmC.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\NFfbsnW.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\pSvpIrP.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kPTqqPU.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\rKWwHzF.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\YAlChWV.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\rMxhYhf.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DxApaBW.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\JDYtVCl.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\lJtVGCA.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SpRzuJK.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\BcUodTs.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\odotGcD.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\iIiCJuN.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\LWDTCnW.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\Xkiahee.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\AeDOlzv.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\EMiAJsR.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ewSzXeV.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\PAxVzcv.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\jzPXTly.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\UNbIdLF.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\JutbETl.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VAWJzWl.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kzBRIRT.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\OoMTpTs.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\miofWNV.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\fijAKUX.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\xAfigDA.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\cUkuPPe.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\vrzQozG.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\qsAvEgp.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SMBZJFP.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\LICltMV.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kABbgAL.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kBpGmoG.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VmixGoK.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\YuIZOnh.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ANRYaUY.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\QIYrBpk.exe 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1412605595-2147700071-3468511006-1000\{C02780D0-0544-48BF-8B1B-E363032F1713} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1412605595-2147700071-3468511006-1000\{D5C64F61-ED6C-4BCB-A5C6-8FFB9DEDB177} explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1412605595-2147700071-3468511006-1000\{7EDD5BDC-7F66-4DF6-9F10-A37C0F684B01} explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1412605595-2147700071-3468511006-1000\{A6C7AF58-FF36-443C-AA35-0E17DA0BF5AE} explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1412605595-2147700071-3468511006-1000\{C5DE2C1A-5D0F-4B9F-AC5A-9ED64A0F3898} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 15324 explorer.exe Token: SeCreatePagefilePrivilege 15324 explorer.exe Token: SeShutdownPrivilege 15324 explorer.exe Token: SeCreatePagefilePrivilege 15324 explorer.exe Token: SeShutdownPrivilege 15324 explorer.exe Token: SeCreatePagefilePrivilege 15324 explorer.exe Token: SeShutdownPrivilege 15324 explorer.exe Token: SeCreatePagefilePrivilege 15324 explorer.exe Token: SeShutdownPrivilege 15324 explorer.exe Token: SeCreatePagefilePrivilege 15324 explorer.exe Token: SeShutdownPrivilege 15324 explorer.exe Token: SeCreatePagefilePrivilege 15324 explorer.exe Token: SeShutdownPrivilege 15324 explorer.exe Token: SeCreatePagefilePrivilege 15324 explorer.exe Token: SeShutdownPrivilege 15324 explorer.exe Token: SeCreatePagefilePrivilege 15324 explorer.exe Token: SeShutdownPrivilege 15324 explorer.exe Token: SeCreatePagefilePrivilege 15324 explorer.exe Token: SeShutdownPrivilege 15324 explorer.exe Token: SeCreatePagefilePrivilege 15324 explorer.exe Token: SeShutdownPrivilege 5368 explorer.exe Token: SeCreatePagefilePrivilege 5368 explorer.exe Token: SeShutdownPrivilege 5368 explorer.exe Token: SeCreatePagefilePrivilege 5368 explorer.exe Token: SeShutdownPrivilege 5368 explorer.exe Token: SeCreatePagefilePrivilege 5368 explorer.exe Token: SeShutdownPrivilege 5368 explorer.exe Token: SeCreatePagefilePrivilege 5368 explorer.exe Token: SeShutdownPrivilege 5368 explorer.exe Token: SeCreatePagefilePrivilege 5368 explorer.exe Token: SeShutdownPrivilege 5368 explorer.exe Token: SeCreatePagefilePrivilege 5368 explorer.exe Token: SeShutdownPrivilege 5368 explorer.exe Token: SeCreatePagefilePrivilege 5368 explorer.exe Token: SeShutdownPrivilege 5368 explorer.exe Token: SeCreatePagefilePrivilege 5368 explorer.exe Token: SeShutdownPrivilege 5368 explorer.exe Token: SeCreatePagefilePrivilege 5368 explorer.exe Token: SeShutdownPrivilege 5368 explorer.exe Token: SeCreatePagefilePrivilege 5368 explorer.exe Token: SeShutdownPrivilege 5368 explorer.exe Token: SeCreatePagefilePrivilege 5368 explorer.exe Token: SeShutdownPrivilege 7372 explorer.exe Token: SeCreatePagefilePrivilege 7372 explorer.exe Token: SeShutdownPrivilege 7372 explorer.exe Token: SeCreatePagefilePrivilege 7372 explorer.exe Token: SeShutdownPrivilege 7372 explorer.exe Token: SeCreatePagefilePrivilege 7372 explorer.exe Token: SeShutdownPrivilege 7372 explorer.exe Token: SeCreatePagefilePrivilege 7372 explorer.exe Token: SeShutdownPrivilege 7372 explorer.exe Token: SeCreatePagefilePrivilege 7372 explorer.exe Token: SeShutdownPrivilege 7372 explorer.exe Token: SeCreatePagefilePrivilege 7372 explorer.exe Token: SeShutdownPrivilege 7372 explorer.exe Token: SeCreatePagefilePrivilege 7372 explorer.exe Token: SeShutdownPrivilege 7372 explorer.exe Token: SeCreatePagefilePrivilege 7372 explorer.exe Token: SeShutdownPrivilege 7372 explorer.exe Token: SeCreatePagefilePrivilege 7372 explorer.exe Token: SeShutdownPrivilege 7372 explorer.exe Token: SeCreatePagefilePrivilege 7372 explorer.exe Token: SeShutdownPrivilege 7372 explorer.exe Token: SeCreatePagefilePrivilege 7372 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 15168 sihost.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 15324 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 5368 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 7372 explorer.exe 10540 explorer.exe 10540 explorer.exe 10540 explorer.exe 10540 explorer.exe 10540 explorer.exe 10540 explorer.exe 10540 explorer.exe 10540 explorer.exe 10540 explorer.exe 10540 explorer.exe 10540 explorer.exe 3652 explorer.exe 3652 explorer.exe 3652 explorer.exe 3652 explorer.exe 3652 explorer.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 5228 StartMenuExperienceHost.exe 6728 StartMenuExperienceHost.exe 7764 StartMenuExperienceHost.exe 7724 SearchApp.exe 756 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4256 wrote to memory of 3656 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 84 PID 4256 wrote to memory of 3656 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 84 PID 4256 wrote to memory of 4652 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 85 PID 4256 wrote to memory of 4652 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 85 PID 4256 wrote to memory of 4576 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 86 PID 4256 wrote to memory of 4576 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 86 PID 4256 wrote to memory of 2500 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 87 PID 4256 wrote to memory of 2500 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 87 PID 4256 wrote to memory of 5048 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 88 PID 4256 wrote to memory of 5048 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 88 PID 4256 wrote to memory of 3948 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 89 PID 4256 wrote to memory of 3948 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 89 PID 4256 wrote to memory of 3704 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 90 PID 4256 wrote to memory of 3704 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 90 PID 4256 wrote to memory of 1928 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 91 PID 4256 wrote to memory of 1928 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 91 PID 4256 wrote to memory of 3352 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 92 PID 4256 wrote to memory of 3352 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 92 PID 4256 wrote to memory of 3216 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 93 PID 4256 wrote to memory of 3216 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 93 PID 4256 wrote to memory of 1600 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 94 PID 4256 wrote to memory of 1600 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 94 PID 4256 wrote to memory of 720 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 95 PID 4256 wrote to memory of 720 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 95 PID 4256 wrote to memory of 3136 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 96 PID 4256 wrote to memory of 3136 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 96 PID 4256 wrote to memory of 3152 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 97 PID 4256 wrote to memory of 3152 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 97 PID 4256 wrote to memory of 2376 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 98 PID 4256 wrote to memory of 2376 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 98 PID 4256 wrote to memory of 4240 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 99 PID 4256 wrote to memory of 4240 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 99 PID 4256 wrote to memory of 2036 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 100 PID 4256 wrote to memory of 2036 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 100 PID 4256 wrote to memory of 3644 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 101 PID 4256 wrote to memory of 3644 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 101 PID 4256 wrote to memory of 2412 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 102 PID 4256 wrote to memory of 2412 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 102 PID 4256 wrote to memory of 4052 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 103 PID 4256 wrote to memory of 4052 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 103 PID 4256 wrote to memory of 4896 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 104 PID 4256 wrote to memory of 4896 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 104 PID 4256 wrote to memory of 628 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 105 PID 4256 wrote to memory of 628 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 105 PID 4256 wrote to memory of 4460 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 106 PID 4256 wrote to memory of 4460 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 106 PID 4256 wrote to memory of 1652 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 107 PID 4256 wrote to memory of 1652 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 107 PID 4256 wrote to memory of 1716 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 108 PID 4256 wrote to memory of 1716 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 108 PID 4256 wrote to memory of 3992 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 109 PID 4256 wrote to memory of 3992 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 109 PID 4256 wrote to memory of 2612 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 110 PID 4256 wrote to memory of 2612 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 110 PID 4256 wrote to memory of 2348 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 111 PID 4256 wrote to memory of 2348 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 111 PID 4256 wrote to memory of 2360 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 112 PID 4256 wrote to memory of 2360 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 112 PID 4256 wrote to memory of 1060 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 113 PID 4256 wrote to memory of 1060 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 113 PID 4256 wrote to memory of 2796 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 114 PID 4256 wrote to memory of 2796 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 114 PID 4256 wrote to memory of 4252 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 116 PID 4256 wrote to memory of 4252 4256 2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-31_5e08c240f61bf21310b6ec5b503c4711_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\System\lvyRWYa.exeC:\Windows\System\lvyRWYa.exe2⤵
- Executes dropped EXE
PID:3656
-
-
C:\Windows\System\bDOrzEP.exeC:\Windows\System\bDOrzEP.exe2⤵
- Executes dropped EXE
PID:4652
-
-
C:\Windows\System\YXfDknq.exeC:\Windows\System\YXfDknq.exe2⤵
- Executes dropped EXE
PID:4576
-
-
C:\Windows\System\bPBoVXx.exeC:\Windows\System\bPBoVXx.exe2⤵
- Executes dropped EXE
PID:2500
-
-
C:\Windows\System\JDYtVCl.exeC:\Windows\System\JDYtVCl.exe2⤵
- Executes dropped EXE
PID:5048
-
-
C:\Windows\System\XrlEKig.exeC:\Windows\System\XrlEKig.exe2⤵
- Executes dropped EXE
PID:3948
-
-
C:\Windows\System\sClAqEI.exeC:\Windows\System\sClAqEI.exe2⤵
- Executes dropped EXE
PID:3704
-
-
C:\Windows\System\tadoUKj.exeC:\Windows\System\tadoUKj.exe2⤵
- Executes dropped EXE
PID:1928
-
-
C:\Windows\System\nQyAEuj.exeC:\Windows\System\nQyAEuj.exe2⤵
- Executes dropped EXE
PID:3352
-
-
C:\Windows\System\KIjYmYU.exeC:\Windows\System\KIjYmYU.exe2⤵
- Executes dropped EXE
PID:3216
-
-
C:\Windows\System\fijAKUX.exeC:\Windows\System\fijAKUX.exe2⤵
- Executes dropped EXE
PID:1600
-
-
C:\Windows\System\qUYYHOo.exeC:\Windows\System\qUYYHOo.exe2⤵
- Executes dropped EXE
PID:720
-
-
C:\Windows\System\LJrUvaA.exeC:\Windows\System\LJrUvaA.exe2⤵
- Executes dropped EXE
PID:3136
-
-
C:\Windows\System\QeadGRB.exeC:\Windows\System\QeadGRB.exe2⤵
- Executes dropped EXE
PID:3152
-
-
C:\Windows\System\SIGTwMG.exeC:\Windows\System\SIGTwMG.exe2⤵
- Executes dropped EXE
PID:2376
-
-
C:\Windows\System\oENfJDM.exeC:\Windows\System\oENfJDM.exe2⤵
- Executes dropped EXE
PID:4240
-
-
C:\Windows\System\NoXfDlL.exeC:\Windows\System\NoXfDlL.exe2⤵
- Executes dropped EXE
PID:2036
-
-
C:\Windows\System\QzaIXKw.exeC:\Windows\System\QzaIXKw.exe2⤵
- Executes dropped EXE
PID:3644
-
-
C:\Windows\System\pqeqcUn.exeC:\Windows\System\pqeqcUn.exe2⤵
- Executes dropped EXE
PID:2412
-
-
C:\Windows\System\NupiCVe.exeC:\Windows\System\NupiCVe.exe2⤵
- Executes dropped EXE
PID:4052
-
-
C:\Windows\System\TKYTEeP.exeC:\Windows\System\TKYTEeP.exe2⤵
- Executes dropped EXE
PID:4896
-
-
C:\Windows\System\RBRAQqX.exeC:\Windows\System\RBRAQqX.exe2⤵
- Executes dropped EXE
PID:628
-
-
C:\Windows\System\EznDYpL.exeC:\Windows\System\EznDYpL.exe2⤵
- Executes dropped EXE
PID:4460
-
-
C:\Windows\System\ONYKAam.exeC:\Windows\System\ONYKAam.exe2⤵
- Executes dropped EXE
PID:1652
-
-
C:\Windows\System\QFkDddX.exeC:\Windows\System\QFkDddX.exe2⤵
- Executes dropped EXE
PID:1716
-
-
C:\Windows\System\PilcIjz.exeC:\Windows\System\PilcIjz.exe2⤵
- Executes dropped EXE
PID:3992
-
-
C:\Windows\System\wfBUYdY.exeC:\Windows\System\wfBUYdY.exe2⤵
- Executes dropped EXE
PID:2612
-
-
C:\Windows\System\KiHIpHR.exeC:\Windows\System\KiHIpHR.exe2⤵
- Executes dropped EXE
PID:2348
-
-
C:\Windows\System\SGKzZkH.exeC:\Windows\System\SGKzZkH.exe2⤵
- Executes dropped EXE
PID:2360
-
-
C:\Windows\System\nGsfEeV.exeC:\Windows\System\nGsfEeV.exe2⤵
- Executes dropped EXE
PID:1060
-
-
C:\Windows\System\DtpxTWo.exeC:\Windows\System\DtpxTWo.exe2⤵
- Executes dropped EXE
PID:2796
-
-
C:\Windows\System\hVUAXTz.exeC:\Windows\System\hVUAXTz.exe2⤵
- Executes dropped EXE
PID:4252
-
-
C:\Windows\System\rFkYPrV.exeC:\Windows\System\rFkYPrV.exe2⤵
- Executes dropped EXE
PID:4704
-
-
C:\Windows\System\EMjjHph.exeC:\Windows\System\EMjjHph.exe2⤵
- Executes dropped EXE
PID:3996
-
-
C:\Windows\System\ZRQCYGk.exeC:\Windows\System\ZRQCYGk.exe2⤵
- Executes dropped EXE
PID:4936
-
-
C:\Windows\System\MYrnWfP.exeC:\Windows\System\MYrnWfP.exe2⤵
- Executes dropped EXE
PID:1700
-
-
C:\Windows\System\sxQhsPK.exeC:\Windows\System\sxQhsPK.exe2⤵
- Executes dropped EXE
PID:1808
-
-
C:\Windows\System\tazaQDH.exeC:\Windows\System\tazaQDH.exe2⤵
- Executes dropped EXE
PID:536
-
-
C:\Windows\System\uSnfNvy.exeC:\Windows\System\uSnfNvy.exe2⤵
- Executes dropped EXE
PID:3900
-
-
C:\Windows\System\QdJGrwj.exeC:\Windows\System\QdJGrwj.exe2⤵
- Executes dropped EXE
PID:5068
-
-
C:\Windows\System\WBonQZv.exeC:\Windows\System\WBonQZv.exe2⤵
- Executes dropped EXE
PID:3420
-
-
C:\Windows\System\FVAdtAJ.exeC:\Windows\System\FVAdtAJ.exe2⤵
- Executes dropped EXE
PID:4844
-
-
C:\Windows\System\NHqyVMA.exeC:\Windows\System\NHqyVMA.exe2⤵
- Executes dropped EXE
PID:4876
-
-
C:\Windows\System\BgUVeZk.exeC:\Windows\System\BgUVeZk.exe2⤵
- Executes dropped EXE
PID:4760
-
-
C:\Windows\System\ukLImJj.exeC:\Windows\System\ukLImJj.exe2⤵
- Executes dropped EXE
PID:4000
-
-
C:\Windows\System\uxgdTXR.exeC:\Windows\System\uxgdTXR.exe2⤵
- Executes dropped EXE
PID:3684
-
-
C:\Windows\System\zWPMcUL.exeC:\Windows\System\zWPMcUL.exe2⤵
- Executes dropped EXE
PID:3952
-
-
C:\Windows\System\VjweXAo.exeC:\Windows\System\VjweXAo.exe2⤵
- Executes dropped EXE
PID:3028
-
-
C:\Windows\System\tXDmTJk.exeC:\Windows\System\tXDmTJk.exe2⤵
- Executes dropped EXE
PID:1540
-
-
C:\Windows\System\RhliUML.exeC:\Windows\System\RhliUML.exe2⤵
- Executes dropped EXE
PID:2216
-
-
C:\Windows\System\qauQKdT.exeC:\Windows\System\qauQKdT.exe2⤵
- Executes dropped EXE
PID:4780
-
-
C:\Windows\System\xAfigDA.exeC:\Windows\System\xAfigDA.exe2⤵
- Executes dropped EXE
PID:1376
-
-
C:\Windows\System\yjZnzFx.exeC:\Windows\System\yjZnzFx.exe2⤵
- Executes dropped EXE
PID:2808
-
-
C:\Windows\System\eBdiiEt.exeC:\Windows\System\eBdiiEt.exe2⤵
- Executes dropped EXE
PID:2020
-
-
C:\Windows\System\SOEtEXc.exeC:\Windows\System\SOEtEXc.exe2⤵
- Executes dropped EXE
PID:4320
-
-
C:\Windows\System\tIvjEaX.exeC:\Windows\System\tIvjEaX.exe2⤵
- Executes dropped EXE
PID:4904
-
-
C:\Windows\System\skgjTZr.exeC:\Windows\System\skgjTZr.exe2⤵
- Executes dropped EXE
PID:2480
-
-
C:\Windows\System\dMoJjgb.exeC:\Windows\System\dMoJjgb.exe2⤵
- Executes dropped EXE
PID:1936
-
-
C:\Windows\System\YuIZOnh.exeC:\Windows\System\YuIZOnh.exe2⤵
- Executes dropped EXE
PID:744
-
-
C:\Windows\System\DjAyxQZ.exeC:\Windows\System\DjAyxQZ.exe2⤵
- Executes dropped EXE
PID:464
-
-
C:\Windows\System\dRQFtNO.exeC:\Windows\System\dRQFtNO.exe2⤵
- Executes dropped EXE
PID:3928
-
-
C:\Windows\System\XlBpFzP.exeC:\Windows\System\XlBpFzP.exe2⤵
- Executes dropped EXE
PID:1536
-
-
C:\Windows\System\vPxTGXo.exeC:\Windows\System\vPxTGXo.exe2⤵
- Executes dropped EXE
PID:4684
-
-
C:\Windows\System\NqFSFXs.exeC:\Windows\System\NqFSFXs.exe2⤵
- Executes dropped EXE
PID:4336
-
-
C:\Windows\System\glPMIMt.exeC:\Windows\System\glPMIMt.exe2⤵PID:3484
-
-
C:\Windows\System\mgNQxdX.exeC:\Windows\System\mgNQxdX.exe2⤵PID:3960
-
-
C:\Windows\System\OFuGsEl.exeC:\Windows\System\OFuGsEl.exe2⤵PID:4340
-
-
C:\Windows\System\nmDbPCj.exeC:\Windows\System\nmDbPCj.exe2⤵PID:4836
-
-
C:\Windows\System\vKoBBCh.exeC:\Windows\System\vKoBBCh.exe2⤵PID:2424
-
-
C:\Windows\System\tyDVYWb.exeC:\Windows\System\tyDVYWb.exe2⤵PID:1872
-
-
C:\Windows\System\xnvCfad.exeC:\Windows\System\xnvCfad.exe2⤵PID:4152
-
-
C:\Windows\System\eHdALsY.exeC:\Windows\System\eHdALsY.exe2⤵PID:1896
-
-
C:\Windows\System\riWFZLs.exeC:\Windows\System\riWFZLs.exe2⤵PID:376
-
-
C:\Windows\System\naoRdWi.exeC:\Windows\System\naoRdWi.exe2⤵PID:400
-
-
C:\Windows\System\SWQkxrL.exeC:\Windows\System\SWQkxrL.exe2⤵PID:3600
-
-
C:\Windows\System\isdHrHA.exeC:\Windows\System\isdHrHA.exe2⤵PID:876
-
-
C:\Windows\System\ahvNpbc.exeC:\Windows\System\ahvNpbc.exe2⤵PID:3868
-
-
C:\Windows\System\qgKTxJW.exeC:\Windows\System\qgKTxJW.exe2⤵PID:1608
-
-
C:\Windows\System\YoNdyRz.exeC:\Windows\System\YoNdyRz.exe2⤵PID:1748
-
-
C:\Windows\System\kJyDJdN.exeC:\Windows\System\kJyDJdN.exe2⤵PID:4952
-
-
C:\Windows\System\WGEFCpQ.exeC:\Windows\System\WGEFCpQ.exe2⤵PID:3532
-
-
C:\Windows\System\wwvIGHc.exeC:\Windows\System\wwvIGHc.exe2⤵PID:1596
-
-
C:\Windows\System\SOECpjd.exeC:\Windows\System\SOECpjd.exe2⤵PID:4352
-
-
C:\Windows\System\JGpKgGw.exeC:\Windows\System\JGpKgGw.exe2⤵PID:3500
-
-
C:\Windows\System\GXcNTNW.exeC:\Windows\System\GXcNTNW.exe2⤵PID:1212
-
-
C:\Windows\System\ewSzXeV.exeC:\Windows\System\ewSzXeV.exe2⤵PID:1488
-
-
C:\Windows\System\ysldAwf.exeC:\Windows\System\ysldAwf.exe2⤵PID:2460
-
-
C:\Windows\System\waKZqIM.exeC:\Windows\System\waKZqIM.exe2⤵PID:3884
-
-
C:\Windows\System\sklHEuT.exeC:\Windows\System\sklHEuT.exe2⤵PID:2732
-
-
C:\Windows\System\PIxOAem.exeC:\Windows\System\PIxOAem.exe2⤵PID:3000
-
-
C:\Windows\System\msRJYZm.exeC:\Windows\System\msRJYZm.exe2⤵PID:4040
-
-
C:\Windows\System\KylKnwo.exeC:\Windows\System\KylKnwo.exe2⤵PID:3008
-
-
C:\Windows\System\vRwSryT.exeC:\Windows\System\vRwSryT.exe2⤵PID:3336
-
-
C:\Windows\System\BcYfiZo.exeC:\Windows\System\BcYfiZo.exe2⤵PID:5132
-
-
C:\Windows\System\kPTqqPU.exeC:\Windows\System\kPTqqPU.exe2⤵PID:5156
-
-
C:\Windows\System\hRppOhP.exeC:\Windows\System\hRppOhP.exe2⤵PID:5188
-
-
C:\Windows\System\uvtKGAG.exeC:\Windows\System\uvtKGAG.exe2⤵PID:5216
-
-
C:\Windows\System\EHnHvQA.exeC:\Windows\System\EHnHvQA.exe2⤵PID:5244
-
-
C:\Windows\System\HYUsqUW.exeC:\Windows\System\HYUsqUW.exe2⤵PID:5272
-
-
C:\Windows\System\cjakFLP.exeC:\Windows\System\cjakFLP.exe2⤵PID:5304
-
-
C:\Windows\System\CzDDAfK.exeC:\Windows\System\CzDDAfK.exe2⤵PID:5332
-
-
C:\Windows\System\btRRvsk.exeC:\Windows\System\btRRvsk.exe2⤵PID:5360
-
-
C:\Windows\System\eVPRFAL.exeC:\Windows\System\eVPRFAL.exe2⤵PID:5384
-
-
C:\Windows\System\qCfiMEH.exeC:\Windows\System\qCfiMEH.exe2⤵PID:5416
-
-
C:\Windows\System\YendXJg.exeC:\Windows\System\YendXJg.exe2⤵PID:5444
-
-
C:\Windows\System\WaREkRb.exeC:\Windows\System\WaREkRb.exe2⤵PID:5476
-
-
C:\Windows\System\rKWwHzF.exeC:\Windows\System\rKWwHzF.exe2⤵PID:5504
-
-
C:\Windows\System\fuzcdlI.exeC:\Windows\System\fuzcdlI.exe2⤵PID:5532
-
-
C:\Windows\System\vxdMiIN.exeC:\Windows\System\vxdMiIN.exe2⤵PID:5560
-
-
C:\Windows\System\auPblSB.exeC:\Windows\System\auPblSB.exe2⤵PID:5588
-
-
C:\Windows\System\kZjpPqe.exeC:\Windows\System\kZjpPqe.exe2⤵PID:5616
-
-
C:\Windows\System\wepnbit.exeC:\Windows\System\wepnbit.exe2⤵PID:5644
-
-
C:\Windows\System\nIoGwtz.exeC:\Windows\System\nIoGwtz.exe2⤵PID:5672
-
-
C:\Windows\System\yrXdhjK.exeC:\Windows\System\yrXdhjK.exe2⤵PID:5700
-
-
C:\Windows\System\BaSPZZg.exeC:\Windows\System\BaSPZZg.exe2⤵PID:5732
-
-
C:\Windows\System\OcvkCob.exeC:\Windows\System\OcvkCob.exe2⤵PID:5760
-
-
C:\Windows\System\ADxqiIQ.exeC:\Windows\System\ADxqiIQ.exe2⤵PID:5788
-
-
C:\Windows\System\HzfPXgL.exeC:\Windows\System\HzfPXgL.exe2⤵PID:5816
-
-
C:\Windows\System\yJUjLtz.exeC:\Windows\System\yJUjLtz.exe2⤵PID:5844
-
-
C:\Windows\System\ctaJcmX.exeC:\Windows\System\ctaJcmX.exe2⤵PID:5872
-
-
C:\Windows\System\qsTsBZT.exeC:\Windows\System\qsTsBZT.exe2⤵PID:5900
-
-
C:\Windows\System\EdbLWyq.exeC:\Windows\System\EdbLWyq.exe2⤵PID:5932
-
-
C:\Windows\System\WBbLSqk.exeC:\Windows\System\WBbLSqk.exe2⤵PID:5952
-
-
C:\Windows\System\RFksLkY.exeC:\Windows\System\RFksLkY.exe2⤵PID:5980
-
-
C:\Windows\System\TWIkhol.exeC:\Windows\System\TWIkhol.exe2⤵PID:6008
-
-
C:\Windows\System\kBkmimu.exeC:\Windows\System\kBkmimu.exe2⤵PID:6032
-
-
C:\Windows\System\XlcanZM.exeC:\Windows\System\XlcanZM.exe2⤵PID:6076
-
-
C:\Windows\System\pZhtwoV.exeC:\Windows\System\pZhtwoV.exe2⤵PID:6104
-
-
C:\Windows\System\OnFkcHv.exeC:\Windows\System\OnFkcHv.exe2⤵PID:6132
-
-
C:\Windows\System\bbTUUyM.exeC:\Windows\System\bbTUUyM.exe2⤵PID:5164
-
-
C:\Windows\System\ZpEUPrS.exeC:\Windows\System\ZpEUPrS.exe2⤵PID:5224
-
-
C:\Windows\System\TRzHLXk.exeC:\Windows\System\TRzHLXk.exe2⤵PID:184
-
-
C:\Windows\System\wuuIAmi.exeC:\Windows\System\wuuIAmi.exe2⤵PID:1772
-
-
C:\Windows\System\rVKWAop.exeC:\Windows\System\rVKWAop.exe2⤵PID:3660
-
-
C:\Windows\System\LgJFXvh.exeC:\Windows\System\LgJFXvh.exe2⤵PID:516
-
-
C:\Windows\System\gaVXlFb.exeC:\Windows\System\gaVXlFb.exe2⤵PID:5284
-
-
C:\Windows\System\fpkrTqB.exeC:\Windows\System\fpkrTqB.exe2⤵PID:5340
-
-
C:\Windows\System\KtwKjAw.exeC:\Windows\System\KtwKjAw.exe2⤵PID:5312
-
-
C:\Windows\System\EvUsMpt.exeC:\Windows\System\EvUsMpt.exe2⤵PID:5456
-
-
C:\Windows\System\eVHqeZQ.exeC:\Windows\System\eVHqeZQ.exe2⤵PID:5528
-
-
C:\Windows\System\MnrJvIG.exeC:\Windows\System\MnrJvIG.exe2⤵PID:5584
-
-
C:\Windows\System\dSDRTCa.exeC:\Windows\System\dSDRTCa.exe2⤵PID:5652
-
-
C:\Windows\System\FjRQCvY.exeC:\Windows\System\FjRQCvY.exe2⤵PID:5728
-
-
C:\Windows\System\mPFWwjy.exeC:\Windows\System\mPFWwjy.exe2⤵PID:5784
-
-
C:\Windows\System\gjtLoWM.exeC:\Windows\System\gjtLoWM.exe2⤵PID:5824
-
-
C:\Windows\System\uimrpQl.exeC:\Windows\System\uimrpQl.exe2⤵PID:5888
-
-
C:\Windows\System\xrOsHJU.exeC:\Windows\System\xrOsHJU.exe2⤵PID:5940
-
-
C:\Windows\System\SqRGwYp.exeC:\Windows\System\SqRGwYp.exe2⤵PID:5948
-
-
C:\Windows\System\HKLqhnL.exeC:\Windows\System\HKLqhnL.exe2⤵PID:6056
-
-
C:\Windows\System\fJYmJbV.exeC:\Windows\System\fJYmJbV.exe2⤵PID:2624
-
-
C:\Windows\System\AtLviFl.exeC:\Windows\System\AtLviFl.exe2⤵PID:3676
-
-
C:\Windows\System\wgTXVCq.exeC:\Windows\System\wgTXVCq.exe2⤵PID:1968
-
-
C:\Windows\System\ouTJOpK.exeC:\Windows\System\ouTJOpK.exe2⤵PID:5372
-
-
C:\Windows\System\dsRWHlC.exeC:\Windows\System\dsRWHlC.exe2⤵PID:5500
-
-
C:\Windows\System\iOLkcYm.exeC:\Windows\System\iOLkcYm.exe2⤵PID:5668
-
-
C:\Windows\System\vrzQozG.exeC:\Windows\System\vrzQozG.exe2⤵PID:5804
-
-
C:\Windows\System\SSeFZXh.exeC:\Windows\System\SSeFZXh.exe2⤵PID:6040
-
-
C:\Windows\System\kWaMqzn.exeC:\Windows\System\kWaMqzn.exe2⤵PID:6112
-
-
C:\Windows\System\oZHTYVu.exeC:\Windows\System\oZHTYVu.exe2⤵PID:4900
-
-
C:\Windows\System\EStilGQ.exeC:\Windows\System\EStilGQ.exe2⤵PID:5492
-
-
C:\Windows\System\FdIkzft.exeC:\Windows\System\FdIkzft.exe2⤵PID:5756
-
-
C:\Windows\System\qPXDULv.exeC:\Windows\System\qPXDULv.exe2⤵PID:5148
-
-
C:\Windows\System\sJDNDKF.exeC:\Windows\System\sJDNDKF.exe2⤵PID:5612
-
-
C:\Windows\System\nBOmmZe.exeC:\Windows\System\nBOmmZe.exe2⤵PID:5404
-
-
C:\Windows\System\tfFHLuM.exeC:\Windows\System\tfFHLuM.exe2⤵PID:6152
-
-
C:\Windows\System\qoBwgmo.exeC:\Windows\System\qoBwgmo.exe2⤵PID:6180
-
-
C:\Windows\System\eQUNczr.exeC:\Windows\System\eQUNczr.exe2⤵PID:6208
-
-
C:\Windows\System\hyYYYQM.exeC:\Windows\System\hyYYYQM.exe2⤵PID:6232
-
-
C:\Windows\System\SSwDhOw.exeC:\Windows\System\SSwDhOw.exe2⤵PID:6252
-
-
C:\Windows\System\oAZCrvy.exeC:\Windows\System\oAZCrvy.exe2⤵PID:6272
-
-
C:\Windows\System\kudsSpM.exeC:\Windows\System\kudsSpM.exe2⤵PID:6312
-
-
C:\Windows\System\qUMfuXn.exeC:\Windows\System\qUMfuXn.exe2⤵PID:6348
-
-
C:\Windows\System\BQWLyzl.exeC:\Windows\System\BQWLyzl.exe2⤵PID:6376
-
-
C:\Windows\System\jSHhWCh.exeC:\Windows\System\jSHhWCh.exe2⤵PID:6404
-
-
C:\Windows\System\xELKUxE.exeC:\Windows\System\xELKUxE.exe2⤵PID:6436
-
-
C:\Windows\System\dgwbSMM.exeC:\Windows\System\dgwbSMM.exe2⤵PID:6460
-
-
C:\Windows\System\FVyzOkM.exeC:\Windows\System\FVyzOkM.exe2⤵PID:6488
-
-
C:\Windows\System\ZmgEKmC.exeC:\Windows\System\ZmgEKmC.exe2⤵PID:6516
-
-
C:\Windows\System\VEpptNF.exeC:\Windows\System\VEpptNF.exe2⤵PID:6548
-
-
C:\Windows\System\GQEqLXW.exeC:\Windows\System\GQEqLXW.exe2⤵PID:6576
-
-
C:\Windows\System\UNbIdLF.exeC:\Windows\System\UNbIdLF.exe2⤵PID:6604
-
-
C:\Windows\System\AcSxRqt.exeC:\Windows\System\AcSxRqt.exe2⤵PID:6628
-
-
C:\Windows\System\OcCpgYS.exeC:\Windows\System\OcCpgYS.exe2⤵PID:6660
-
-
C:\Windows\System\dwRelhU.exeC:\Windows\System\dwRelhU.exe2⤵PID:6688
-
-
C:\Windows\System\sYXhZzS.exeC:\Windows\System\sYXhZzS.exe2⤵PID:6712
-
-
C:\Windows\System\RwWNGVL.exeC:\Windows\System\RwWNGVL.exe2⤵PID:6740
-
-
C:\Windows\System\VOhPuVs.exeC:\Windows\System\VOhPuVs.exe2⤵PID:6772
-
-
C:\Windows\System\bflSHOi.exeC:\Windows\System\bflSHOi.exe2⤵PID:6800
-
-
C:\Windows\System\wffpRPa.exeC:\Windows\System\wffpRPa.exe2⤵PID:6828
-
-
C:\Windows\System\sFEnReo.exeC:\Windows\System\sFEnReo.exe2⤵PID:6848
-
-
C:\Windows\System\HfQZBLo.exeC:\Windows\System\HfQZBLo.exe2⤵PID:6884
-
-
C:\Windows\System\HoxnbxS.exeC:\Windows\System\HoxnbxS.exe2⤵PID:6900
-
-
C:\Windows\System\lJtVGCA.exeC:\Windows\System\lJtVGCA.exe2⤵PID:6932
-
-
C:\Windows\System\GwUDTze.exeC:\Windows\System\GwUDTze.exe2⤵PID:6964
-
-
C:\Windows\System\PqUMvzT.exeC:\Windows\System\PqUMvzT.exe2⤵PID:6996
-
-
C:\Windows\System\iLHPyBB.exeC:\Windows\System\iLHPyBB.exe2⤵PID:7020
-
-
C:\Windows\System\PRgeAFc.exeC:\Windows\System\PRgeAFc.exe2⤵PID:7056
-
-
C:\Windows\System\OMyEaLj.exeC:\Windows\System\OMyEaLj.exe2⤵PID:7080
-
-
C:\Windows\System\FIxhIME.exeC:\Windows\System\FIxhIME.exe2⤵PID:7112
-
-
C:\Windows\System\ounQwDG.exeC:\Windows\System\ounQwDG.exe2⤵PID:7136
-
-
C:\Windows\System\rnyqAKd.exeC:\Windows\System\rnyqAKd.exe2⤵PID:7164
-
-
C:\Windows\System\LXItSRM.exeC:\Windows\System\LXItSRM.exe2⤵PID:6204
-
-
C:\Windows\System\syXJTLh.exeC:\Windows\System\syXJTLh.exe2⤵PID:6284
-
-
C:\Windows\System\TduJaae.exeC:\Windows\System\TduJaae.exe2⤵PID:6332
-
-
C:\Windows\System\PyKzRpA.exeC:\Windows\System\PyKzRpA.exe2⤵PID:6412
-
-
C:\Windows\System\LkRAKxF.exeC:\Windows\System\LkRAKxF.exe2⤵PID:6468
-
-
C:\Windows\System\iZansHA.exeC:\Windows\System\iZansHA.exe2⤵PID:6528
-
-
C:\Windows\System\qsAvEgp.exeC:\Windows\System\qsAvEgp.exe2⤵PID:6600
-
-
C:\Windows\System\WQYiwir.exeC:\Windows\System\WQYiwir.exe2⤵PID:6668
-
-
C:\Windows\System\PfpUEAv.exeC:\Windows\System\PfpUEAv.exe2⤵PID:6768
-
-
C:\Windows\System\DFCRESs.exeC:\Windows\System\DFCRESs.exe2⤵PID:6896
-
-
C:\Windows\System\DBLqhHO.exeC:\Windows\System\DBLqhHO.exe2⤵PID:6956
-
-
C:\Windows\System\LPJZQuI.exeC:\Windows\System\LPJZQuI.exe2⤵PID:7032
-
-
C:\Windows\System\dnvOYFo.exeC:\Windows\System\dnvOYFo.exe2⤵PID:6220
-
-
C:\Windows\System\SdTySjz.exeC:\Windows\System\SdTySjz.exe2⤵PID:6640
-
-
C:\Windows\System\GvgHUPi.exeC:\Windows\System\GvgHUPi.exe2⤵PID:6676
-
-
C:\Windows\System\YAlChWV.exeC:\Windows\System\YAlChWV.exe2⤵PID:6940
-
-
C:\Windows\System\ZmnMrXT.exeC:\Windows\System\ZmnMrXT.exe2⤵PID:6160
-
-
C:\Windows\System\hpBFkae.exeC:\Windows\System\hpBFkae.exe2⤵PID:7004
-
-
C:\Windows\System\TzbvbUA.exeC:\Windows\System\TzbvbUA.exe2⤵PID:7044
-
-
C:\Windows\System\ctalrzE.exeC:\Windows\System\ctalrzE.exe2⤵PID:7172
-
-
C:\Windows\System\yssmIWl.exeC:\Windows\System\yssmIWl.exe2⤵PID:7208
-
-
C:\Windows\System\AePsDsU.exeC:\Windows\System\AePsDsU.exe2⤵PID:7236
-
-
C:\Windows\System\dNREQWa.exeC:\Windows\System\dNREQWa.exe2⤵PID:7272
-
-
C:\Windows\System\wHAbGUY.exeC:\Windows\System\wHAbGUY.exe2⤵PID:7320
-
-
C:\Windows\System\SMBZJFP.exeC:\Windows\System\SMBZJFP.exe2⤵PID:7348
-
-
C:\Windows\System\fPedRLB.exeC:\Windows\System\fPedRLB.exe2⤵PID:7380
-
-
C:\Windows\System\zPblqQo.exeC:\Windows\System\zPblqQo.exe2⤵PID:7412
-
-
C:\Windows\System\fUWCvyL.exeC:\Windows\System\fUWCvyL.exe2⤵PID:7436
-
-
C:\Windows\System\cWtgrSr.exeC:\Windows\System\cWtgrSr.exe2⤵PID:7472
-
-
C:\Windows\System\iSjhsrp.exeC:\Windows\System\iSjhsrp.exe2⤵PID:7500
-
-
C:\Windows\System\OfFddHK.exeC:\Windows\System\OfFddHK.exe2⤵PID:7528
-
-
C:\Windows\System\UGNOlpD.exeC:\Windows\System\UGNOlpD.exe2⤵PID:7560
-
-
C:\Windows\System\gccqiUD.exeC:\Windows\System\gccqiUD.exe2⤵PID:7584
-
-
C:\Windows\System\jwkvhyn.exeC:\Windows\System\jwkvhyn.exe2⤵PID:7616
-
-
C:\Windows\System\oieTSWN.exeC:\Windows\System\oieTSWN.exe2⤵PID:7644
-
-
C:\Windows\System\qYCVOKW.exeC:\Windows\System\qYCVOKW.exe2⤵PID:7668
-
-
C:\Windows\System\vBrwxvX.exeC:\Windows\System\vBrwxvX.exe2⤵PID:7696
-
-
C:\Windows\System\nyxkjuq.exeC:\Windows\System\nyxkjuq.exe2⤵PID:7728
-
-
C:\Windows\System\FPCaiRj.exeC:\Windows\System\FPCaiRj.exe2⤵PID:7752
-
-
C:\Windows\System\raNYjYE.exeC:\Windows\System\raNYjYE.exe2⤵PID:7780
-
-
C:\Windows\System\jPBYvgS.exeC:\Windows\System\jPBYvgS.exe2⤵PID:7812
-
-
C:\Windows\System\nvbxVwg.exeC:\Windows\System\nvbxVwg.exe2⤵PID:7836
-
-
C:\Windows\System\zPCVigU.exeC:\Windows\System\zPCVigU.exe2⤵PID:7864
-
-
C:\Windows\System\fkJpnxH.exeC:\Windows\System\fkJpnxH.exe2⤵PID:7884
-
-
C:\Windows\System\SpRzuJK.exeC:\Windows\System\SpRzuJK.exe2⤵PID:7912
-
-
C:\Windows\System\GagNrpz.exeC:\Windows\System\GagNrpz.exe2⤵PID:7948
-
-
C:\Windows\System\AFrBCcz.exeC:\Windows\System\AFrBCcz.exe2⤵PID:7968
-
-
C:\Windows\System\uUtLQKk.exeC:\Windows\System\uUtLQKk.exe2⤵PID:7996
-
-
C:\Windows\System\ghkQqjB.exeC:\Windows\System\ghkQqjB.exe2⤵PID:8024
-
-
C:\Windows\System\GseeCUh.exeC:\Windows\System\GseeCUh.exe2⤵PID:8052
-
-
C:\Windows\System\yhTpBtT.exeC:\Windows\System\yhTpBtT.exe2⤵PID:8084
-
-
C:\Windows\System\SzZVRNH.exeC:\Windows\System\SzZVRNH.exe2⤵PID:8116
-
-
C:\Windows\System\BoBViMq.exeC:\Windows\System\BoBViMq.exe2⤵PID:8144
-
-
C:\Windows\System\fwEFGUs.exeC:\Windows\System\fwEFGUs.exe2⤵PID:8172
-
-
C:\Windows\System\nSxTaZB.exeC:\Windows\System\nSxTaZB.exe2⤵PID:4024
-
-
C:\Windows\System\IDVnbss.exeC:\Windows\System\IDVnbss.exe2⤵PID:7244
-
-
C:\Windows\System\vbQhmLJ.exeC:\Windows\System\vbQhmLJ.exe2⤵PID:7308
-
-
C:\Windows\System\zxEDjCm.exeC:\Windows\System\zxEDjCm.exe2⤵PID:7248
-
-
C:\Windows\System\SFxISdg.exeC:\Windows\System\SFxISdg.exe2⤵PID:6612
-
-
C:\Windows\System\vdBGgAI.exeC:\Windows\System\vdBGgAI.exe2⤵PID:7420
-
-
C:\Windows\System\QGjmmQU.exeC:\Windows\System\QGjmmQU.exe2⤵PID:7484
-
-
C:\Windows\System\wECFQUC.exeC:\Windows\System\wECFQUC.exe2⤵PID:7552
-
-
C:\Windows\System\PAxVzcv.exeC:\Windows\System\PAxVzcv.exe2⤵PID:7612
-
-
C:\Windows\System\ksCdzQT.exeC:\Windows\System\ksCdzQT.exe2⤵PID:7680
-
-
C:\Windows\System\TyGeNSZ.exeC:\Windows\System\TyGeNSZ.exe2⤵PID:7744
-
-
C:\Windows\System\eXBuygl.exeC:\Windows\System\eXBuygl.exe2⤵PID:7800
-
-
C:\Windows\System\bNLqNAg.exeC:\Windows\System\bNLqNAg.exe2⤵PID:7872
-
-
C:\Windows\System\BDsobNk.exeC:\Windows\System\BDsobNk.exe2⤵PID:7936
-
-
C:\Windows\System\CdFTstc.exeC:\Windows\System\CdFTstc.exe2⤵PID:7992
-
-
C:\Windows\System\YjMrFdv.exeC:\Windows\System\YjMrFdv.exe2⤵PID:8064
-
-
C:\Windows\System\tJerdWB.exeC:\Windows\System\tJerdWB.exe2⤵PID:8140
-
-
C:\Windows\System\sEXBVyR.exeC:\Windows\System\sEXBVyR.exe2⤵PID:612
-
-
C:\Windows\System\BhbEfgz.exeC:\Windows\System\BhbEfgz.exe2⤵PID:7292
-
-
C:\Windows\System\mCuBGnZ.exeC:\Windows\System\mCuBGnZ.exe2⤵PID:7392
-
-
C:\Windows\System\kESHBNx.exeC:\Windows\System\kESHBNx.exe2⤵PID:7536
-
-
C:\Windows\System\oRvnTku.exeC:\Windows\System\oRvnTku.exe2⤵PID:7632
-
-
C:\Windows\System\KEcbWyr.exeC:\Windows\System\KEcbWyr.exe2⤵PID:7772
-
-
C:\Windows\System\VhQZNTp.exeC:\Windows\System\VhQZNTp.exe2⤵PID:7908
-
-
C:\Windows\System\SVrKTMH.exeC:\Windows\System\SVrKTMH.exe2⤵PID:8168
-
-
C:\Windows\System\xBdJCwn.exeC:\Windows\System\xBdJCwn.exe2⤵PID:7360
-
-
C:\Windows\System\vFcZHhN.exeC:\Windows\System\vFcZHhN.exe2⤵PID:7736
-
-
C:\Windows\System\JfCFUVj.exeC:\Windows\System\JfCFUVj.exe2⤵PID:8124
-
-
C:\Windows\System\YeryYmM.exeC:\Windows\System\YeryYmM.exe2⤵PID:7216
-
-
C:\Windows\System\rVKJxDg.exeC:\Windows\System\rVKJxDg.exe2⤵PID:6836
-
-
C:\Windows\System\JdwxILq.exeC:\Windows\System\JdwxILq.exe2⤵PID:8020
-
-
C:\Windows\System\xnsPRWc.exeC:\Windows\System\xnsPRWc.exe2⤵PID:6796
-
-
C:\Windows\System\UNgCDih.exeC:\Windows\System\UNgCDih.exe2⤵PID:6788
-
-
C:\Windows\System\vQFrcCS.exeC:\Windows\System\vQFrcCS.exe2⤵PID:8212
-
-
C:\Windows\System\cETSCvF.exeC:\Windows\System\cETSCvF.exe2⤵PID:8244
-
-
C:\Windows\System\AObLbQf.exeC:\Windows\System\AObLbQf.exe2⤵PID:8272
-
-
C:\Windows\System\vpZETRp.exeC:\Windows\System\vpZETRp.exe2⤵PID:8300
-
-
C:\Windows\System\PfrPDJf.exeC:\Windows\System\PfrPDJf.exe2⤵PID:8324
-
-
C:\Windows\System\awDZlAR.exeC:\Windows\System\awDZlAR.exe2⤵PID:8360
-
-
C:\Windows\System\azmtLWf.exeC:\Windows\System\azmtLWf.exe2⤵PID:8384
-
-
C:\Windows\System\GGEASeZ.exeC:\Windows\System\GGEASeZ.exe2⤵PID:8408
-
-
C:\Windows\System\qJfifmO.exeC:\Windows\System\qJfifmO.exe2⤵PID:8436
-
-
C:\Windows\System\nSaxRwc.exeC:\Windows\System\nSaxRwc.exe2⤵PID:8464
-
-
C:\Windows\System\UwxdMgQ.exeC:\Windows\System\UwxdMgQ.exe2⤵PID:8500
-
-
C:\Windows\System\nsRgjXH.exeC:\Windows\System\nsRgjXH.exe2⤵PID:8524
-
-
C:\Windows\System\hFWhSgV.exeC:\Windows\System\hFWhSgV.exe2⤵PID:8548
-
-
C:\Windows\System\AEJAlOF.exeC:\Windows\System\AEJAlOF.exe2⤵PID:8576
-
-
C:\Windows\System\sgfuNFm.exeC:\Windows\System\sgfuNFm.exe2⤵PID:8604
-
-
C:\Windows\System\XHgzXKP.exeC:\Windows\System\XHgzXKP.exe2⤵PID:8632
-
-
C:\Windows\System\xWOKWVs.exeC:\Windows\System\xWOKWVs.exe2⤵PID:8660
-
-
C:\Windows\System\KiQQwuw.exeC:\Windows\System\KiQQwuw.exe2⤵PID:8688
-
-
C:\Windows\System\IocERTv.exeC:\Windows\System\IocERTv.exe2⤵PID:8716
-
-
C:\Windows\System\cOlZruN.exeC:\Windows\System\cOlZruN.exe2⤵PID:8744
-
-
C:\Windows\System\vlKkmHa.exeC:\Windows\System\vlKkmHa.exe2⤵PID:8772
-
-
C:\Windows\System\HSWmBPu.exeC:\Windows\System\HSWmBPu.exe2⤵PID:8800
-
-
C:\Windows\System\ubMMwUo.exeC:\Windows\System\ubMMwUo.exe2⤵PID:8828
-
-
C:\Windows\System\pLAYynS.exeC:\Windows\System\pLAYynS.exe2⤵PID:8856
-
-
C:\Windows\System\RPfCMPt.exeC:\Windows\System\RPfCMPt.exe2⤵PID:8884
-
-
C:\Windows\System\RPdLCIP.exeC:\Windows\System\RPdLCIP.exe2⤵PID:8912
-
-
C:\Windows\System\acPDeer.exeC:\Windows\System\acPDeer.exe2⤵PID:8940
-
-
C:\Windows\System\JLHdZuf.exeC:\Windows\System\JLHdZuf.exe2⤵PID:8968
-
-
C:\Windows\System\OQeUdHq.exeC:\Windows\System\OQeUdHq.exe2⤵PID:9000
-
-
C:\Windows\System\uvQAuor.exeC:\Windows\System\uvQAuor.exe2⤵PID:9028
-
-
C:\Windows\System\AdCtNiS.exeC:\Windows\System\AdCtNiS.exe2⤵PID:9056
-
-
C:\Windows\System\hBfmhlM.exeC:\Windows\System\hBfmhlM.exe2⤵PID:9084
-
-
C:\Windows\System\AIvJVLA.exeC:\Windows\System\AIvJVLA.exe2⤵PID:9112
-
-
C:\Windows\System\mHTxiTV.exeC:\Windows\System\mHTxiTV.exe2⤵PID:9140
-
-
C:\Windows\System\JKzpKhm.exeC:\Windows\System\JKzpKhm.exe2⤵PID:9168
-
-
C:\Windows\System\mvfuBDD.exeC:\Windows\System\mvfuBDD.exe2⤵PID:9196
-
-
C:\Windows\System\CqdtgDo.exeC:\Windows\System\CqdtgDo.exe2⤵PID:8208
-
-
C:\Windows\System\jAZZkWo.exeC:\Windows\System\jAZZkWo.exe2⤵PID:8280
-
-
C:\Windows\System\SQXaiRs.exeC:\Windows\System\SQXaiRs.exe2⤵PID:8344
-
-
C:\Windows\System\wwakuck.exeC:\Windows\System\wwakuck.exe2⤵PID:8404
-
-
C:\Windows\System\ohrhcPu.exeC:\Windows\System\ohrhcPu.exe2⤵PID:8476
-
-
C:\Windows\System\pGgecff.exeC:\Windows\System\pGgecff.exe2⤵PID:8540
-
-
C:\Windows\System\GeeVVpe.exeC:\Windows\System\GeeVVpe.exe2⤵PID:8600
-
-
C:\Windows\System\AYIrZLl.exeC:\Windows\System\AYIrZLl.exe2⤵PID:8672
-
-
C:\Windows\System\dOxzVdt.exeC:\Windows\System\dOxzVdt.exe2⤵PID:8736
-
-
C:\Windows\System\JutbETl.exeC:\Windows\System\JutbETl.exe2⤵PID:8792
-
-
C:\Windows\System\ZBHETBF.exeC:\Windows\System\ZBHETBF.exe2⤵PID:8852
-
-
C:\Windows\System\SZPBhSu.exeC:\Windows\System\SZPBhSu.exe2⤵PID:8924
-
-
C:\Windows\System\uoIyxRO.exeC:\Windows\System\uoIyxRO.exe2⤵PID:8992
-
-
C:\Windows\System\qsYbnYr.exeC:\Windows\System\qsYbnYr.exe2⤵PID:9052
-
-
C:\Windows\System\EERrkcb.exeC:\Windows\System\EERrkcb.exe2⤵PID:9124
-
-
C:\Windows\System\FzJpEwf.exeC:\Windows\System\FzJpEwf.exe2⤵PID:9188
-
-
C:\Windows\System\QFMzCBi.exeC:\Windows\System\QFMzCBi.exe2⤵PID:8264
-
-
C:\Windows\System\ANRYaUY.exeC:\Windows\System\ANRYaUY.exe2⤵PID:8432
-
-
C:\Windows\System\LICltMV.exeC:\Windows\System\LICltMV.exe2⤵PID:8652
-
-
C:\Windows\System\gkKPpRp.exeC:\Windows\System\gkKPpRp.exe2⤵PID:7052
-
-
C:\Windows\System\FmjEWEj.exeC:\Windows\System\FmjEWEj.exe2⤵PID:8988
-
-
C:\Windows\System\zaVxviQ.exeC:\Windows\System\zaVxviQ.exe2⤵PID:9040
-
-
C:\Windows\System\kNicMHa.exeC:\Windows\System\kNicMHa.exe2⤵PID:9180
-
-
C:\Windows\System\FStSrKQ.exeC:\Windows\System\FStSrKQ.exe2⤵PID:3192
-
-
C:\Windows\System\IftnDfF.exeC:\Windows\System\IftnDfF.exe2⤵PID:8848
-
-
C:\Windows\System\ASVgLdT.exeC:\Windows\System\ASVgLdT.exe2⤵PID:9164
-
-
C:\Windows\System\JsXeBdU.exeC:\Windows\System\JsXeBdU.exe2⤵PID:8980
-
-
C:\Windows\System\mvySSum.exeC:\Windows\System\mvySSum.exe2⤵PID:8820
-
-
C:\Windows\System\CZfnHij.exeC:\Windows\System\CZfnHij.exe2⤵PID:9244
-
-
C:\Windows\System\UJMlcpQ.exeC:\Windows\System\UJMlcpQ.exe2⤵PID:9272
-
-
C:\Windows\System\zUoEhdJ.exeC:\Windows\System\zUoEhdJ.exe2⤵PID:9300
-
-
C:\Windows\System\fLUQfvO.exeC:\Windows\System\fLUQfvO.exe2⤵PID:9328
-
-
C:\Windows\System\dXGbnDQ.exeC:\Windows\System\dXGbnDQ.exe2⤵PID:9356
-
-
C:\Windows\System\JhRbcHb.exeC:\Windows\System\JhRbcHb.exe2⤵PID:9384
-
-
C:\Windows\System\bVGPIlk.exeC:\Windows\System\bVGPIlk.exe2⤵PID:9412
-
-
C:\Windows\System\QWWezgJ.exeC:\Windows\System\QWWezgJ.exe2⤵PID:9440
-
-
C:\Windows\System\FYiyzkP.exeC:\Windows\System\FYiyzkP.exe2⤵PID:9468
-
-
C:\Windows\System\kWwiAxv.exeC:\Windows\System\kWwiAxv.exe2⤵PID:9496
-
-
C:\Windows\System\XdeOLku.exeC:\Windows\System\XdeOLku.exe2⤵PID:9524
-
-
C:\Windows\System\mNplDJr.exeC:\Windows\System\mNplDJr.exe2⤵PID:9552
-
-
C:\Windows\System\mBgzqmk.exeC:\Windows\System\mBgzqmk.exe2⤵PID:9580
-
-
C:\Windows\System\xDoMsbS.exeC:\Windows\System\xDoMsbS.exe2⤵PID:9608
-
-
C:\Windows\System\KKzlUZu.exeC:\Windows\System\KKzlUZu.exe2⤵PID:9636
-
-
C:\Windows\System\CiQTnDR.exeC:\Windows\System\CiQTnDR.exe2⤵PID:9664
-
-
C:\Windows\System\jWHwnBH.exeC:\Windows\System\jWHwnBH.exe2⤵PID:9692
-
-
C:\Windows\System\YnCuWXf.exeC:\Windows\System\YnCuWXf.exe2⤵PID:9720
-
-
C:\Windows\System\GTMSZKk.exeC:\Windows\System\GTMSZKk.exe2⤵PID:9748
-
-
C:\Windows\System\VAWJzWl.exeC:\Windows\System\VAWJzWl.exe2⤵PID:9776
-
-
C:\Windows\System\ykbOhEu.exeC:\Windows\System\ykbOhEu.exe2⤵PID:9804
-
-
C:\Windows\System\RrodCRF.exeC:\Windows\System\RrodCRF.exe2⤵PID:9832
-
-
C:\Windows\System\DEEhwII.exeC:\Windows\System\DEEhwII.exe2⤵PID:9860
-
-
C:\Windows\System\kzBRIRT.exeC:\Windows\System\kzBRIRT.exe2⤵PID:9888
-
-
C:\Windows\System\fyDtTeZ.exeC:\Windows\System\fyDtTeZ.exe2⤵PID:9920
-
-
C:\Windows\System\kLZcaRj.exeC:\Windows\System\kLZcaRj.exe2⤵PID:9948
-
-
C:\Windows\System\HemHWcK.exeC:\Windows\System\HemHWcK.exe2⤵PID:9976
-
-
C:\Windows\System\XMHubpa.exeC:\Windows\System\XMHubpa.exe2⤵PID:10004
-
-
C:\Windows\System\tHWpWdB.exeC:\Windows\System\tHWpWdB.exe2⤵PID:10036
-
-
C:\Windows\System\PSjwrdn.exeC:\Windows\System\PSjwrdn.exe2⤵PID:10060
-
-
C:\Windows\System\VhizamT.exeC:\Windows\System\VhizamT.exe2⤵PID:10088
-
-
C:\Windows\System\xCUHNNJ.exeC:\Windows\System\xCUHNNJ.exe2⤵PID:10116
-
-
C:\Windows\System\zYtPyLS.exeC:\Windows\System\zYtPyLS.exe2⤵PID:10144
-
-
C:\Windows\System\DJZjtmC.exeC:\Windows\System\DJZjtmC.exe2⤵PID:10172
-
-
C:\Windows\System\xYFhGQD.exeC:\Windows\System\xYFhGQD.exe2⤵PID:10200
-
-
C:\Windows\System\uwLcSCB.exeC:\Windows\System\uwLcSCB.exe2⤵PID:10228
-
-
C:\Windows\System\IhYXQBN.exeC:\Windows\System\IhYXQBN.exe2⤵PID:9256
-
-
C:\Windows\System\FFQVNrG.exeC:\Windows\System\FFQVNrG.exe2⤵PID:9320
-
-
C:\Windows\System\QLaPCfk.exeC:\Windows\System\QLaPCfk.exe2⤵PID:9380
-
-
C:\Windows\System\GxWdZdH.exeC:\Windows\System\GxWdZdH.exe2⤵PID:9452
-
-
C:\Windows\System\haxlbIj.exeC:\Windows\System\haxlbIj.exe2⤵PID:9536
-
-
C:\Windows\System\wkFVbHP.exeC:\Windows\System\wkFVbHP.exe2⤵PID:9572
-
-
C:\Windows\System\QiyvEyg.exeC:\Windows\System\QiyvEyg.exe2⤵PID:9632
-
-
C:\Windows\System\BvHkcYh.exeC:\Windows\System\BvHkcYh.exe2⤵PID:9688
-
-
C:\Windows\System\DGRZPRz.exeC:\Windows\System\DGRZPRz.exe2⤵PID:9772
-
-
C:\Windows\System\gHrfCHe.exeC:\Windows\System\gHrfCHe.exe2⤵PID:9844
-
-
C:\Windows\System\rSXVrKq.exeC:\Windows\System\rSXVrKq.exe2⤵PID:9912
-
-
C:\Windows\System\sCvepDc.exeC:\Windows\System\sCvepDc.exe2⤵PID:9968
-
-
C:\Windows\System\VvCqItu.exeC:\Windows\System\VvCqItu.exe2⤵PID:10028
-
-
C:\Windows\System\ZtAoKvN.exeC:\Windows\System\ZtAoKvN.exe2⤵PID:10080
-
-
C:\Windows\System\vzGAmwe.exeC:\Windows\System\vzGAmwe.exe2⤵PID:10140
-
-
C:\Windows\System\apbTEYt.exeC:\Windows\System\apbTEYt.exe2⤵PID:10212
-
-
C:\Windows\System\xjHHlXf.exeC:\Windows\System\xjHHlXf.exe2⤵PID:9296
-
-
C:\Windows\System\yVoesjF.exeC:\Windows\System\yVoesjF.exe2⤵PID:4348
-
-
C:\Windows\System\FLKGIjI.exeC:\Windows\System\FLKGIjI.exe2⤵PID:9620
-
-
C:\Windows\System\QIYrBpk.exeC:\Windows\System\QIYrBpk.exe2⤵PID:9744
-
-
C:\Windows\System\yvpDnhj.exeC:\Windows\System\yvpDnhj.exe2⤵PID:9884
-
-
C:\Windows\System\JFdMzTR.exeC:\Windows\System\JFdMzTR.exe2⤵PID:10024
-
-
C:\Windows\System\gihFYIS.exeC:\Windows\System\gihFYIS.exe2⤵PID:10168
-
-
C:\Windows\System\pIAHpAn.exeC:\Windows\System\pIAHpAn.exe2⤵PID:9376
-
-
C:\Windows\System\EnbIxTP.exeC:\Windows\System\EnbIxTP.exe2⤵PID:9716
-
-
C:\Windows\System\jzPXTly.exeC:\Windows\System\jzPXTly.exe2⤵PID:10016
-
-
C:\Windows\System\ucidDBT.exeC:\Windows\System\ucidDBT.exe2⤵PID:9492
-
-
C:\Windows\System\VSSldFb.exeC:\Windows\System\VSSldFb.exe2⤵PID:9240
-
-
C:\Windows\System\edCUpHn.exeC:\Windows\System\edCUpHn.exe2⤵PID:9996
-
-
C:\Windows\System\iPLTJaI.exeC:\Windows\System\iPLTJaI.exe2⤵PID:10244
-
-
C:\Windows\System\ovrYjpp.exeC:\Windows\System\ovrYjpp.exe2⤵PID:10272
-
-
C:\Windows\System\fYAZVfp.exeC:\Windows\System\fYAZVfp.exe2⤵PID:10300
-
-
C:\Windows\System\ZxpKbhS.exeC:\Windows\System\ZxpKbhS.exe2⤵PID:10328
-
-
C:\Windows\System\wbxpOwX.exeC:\Windows\System\wbxpOwX.exe2⤵PID:10356
-
-
C:\Windows\System\HucoPHI.exeC:\Windows\System\HucoPHI.exe2⤵PID:10384
-
-
C:\Windows\System\LYgfQKW.exeC:\Windows\System\LYgfQKW.exe2⤵PID:10412
-
-
C:\Windows\System\HLPOJYM.exeC:\Windows\System\HLPOJYM.exe2⤵PID:10440
-
-
C:\Windows\System\HrsuPdj.exeC:\Windows\System\HrsuPdj.exe2⤵PID:10468
-
-
C:\Windows\System\MQutPJB.exeC:\Windows\System\MQutPJB.exe2⤵PID:10496
-
-
C:\Windows\System\hqqTVtH.exeC:\Windows\System\hqqTVtH.exe2⤵PID:10524
-
-
C:\Windows\System\BZSFzHJ.exeC:\Windows\System\BZSFzHJ.exe2⤵PID:10552
-
-
C:\Windows\System\OiBxNaX.exeC:\Windows\System\OiBxNaX.exe2⤵PID:10580
-
-
C:\Windows\System\YPQZNTd.exeC:\Windows\System\YPQZNTd.exe2⤵PID:10608
-
-
C:\Windows\System\UGYdPDc.exeC:\Windows\System\UGYdPDc.exe2⤵PID:10636
-
-
C:\Windows\System\exRLaFp.exeC:\Windows\System\exRLaFp.exe2⤵PID:10664
-
-
C:\Windows\System\oEAnXsf.exeC:\Windows\System\oEAnXsf.exe2⤵PID:10692
-
-
C:\Windows\System\bsMWBwK.exeC:\Windows\System\bsMWBwK.exe2⤵PID:10720
-
-
C:\Windows\System\qKfFMnA.exeC:\Windows\System\qKfFMnA.exe2⤵PID:10748
-
-
C:\Windows\System\etqiFRw.exeC:\Windows\System\etqiFRw.exe2⤵PID:10776
-
-
C:\Windows\System\jbziJeP.exeC:\Windows\System\jbziJeP.exe2⤵PID:10804
-
-
C:\Windows\System\ftuKpiW.exeC:\Windows\System\ftuKpiW.exe2⤵PID:10836
-
-
C:\Windows\System\BcUodTs.exeC:\Windows\System\BcUodTs.exe2⤵PID:10864
-
-
C:\Windows\System\qNEFIqd.exeC:\Windows\System\qNEFIqd.exe2⤵PID:10892
-
-
C:\Windows\System\WkQMimQ.exeC:\Windows\System\WkQMimQ.exe2⤵PID:10920
-
-
C:\Windows\System\XxZqjNO.exeC:\Windows\System\XxZqjNO.exe2⤵PID:10948
-
-
C:\Windows\System\egcXgup.exeC:\Windows\System\egcXgup.exe2⤵PID:10976
-
-
C:\Windows\System\yPqpaKq.exeC:\Windows\System\yPqpaKq.exe2⤵PID:11004
-
-
C:\Windows\System\cYcQbUB.exeC:\Windows\System\cYcQbUB.exe2⤵PID:11032
-
-
C:\Windows\System\tdywtzg.exeC:\Windows\System\tdywtzg.exe2⤵PID:11072
-
-
C:\Windows\System\kABbgAL.exeC:\Windows\System\kABbgAL.exe2⤵PID:11088
-
-
C:\Windows\System\qcRmduY.exeC:\Windows\System\qcRmduY.exe2⤵PID:11116
-
-
C:\Windows\System\iYatstF.exeC:\Windows\System\iYatstF.exe2⤵PID:11144
-
-
C:\Windows\System\rQSczKp.exeC:\Windows\System\rQSczKp.exe2⤵PID:11172
-
-
C:\Windows\System\ytcTpPu.exeC:\Windows\System\ytcTpPu.exe2⤵PID:11200
-
-
C:\Windows\System\zCerszo.exeC:\Windows\System\zCerszo.exe2⤵PID:11228
-
-
C:\Windows\System\MKcFHkp.exeC:\Windows\System\MKcFHkp.exe2⤵PID:11256
-
-
C:\Windows\System\zuPKIwc.exeC:\Windows\System\zuPKIwc.exe2⤵PID:10292
-
-
C:\Windows\System\rMxhYhf.exeC:\Windows\System\rMxhYhf.exe2⤵PID:10340
-
-
C:\Windows\System\BvIWAzb.exeC:\Windows\System\BvIWAzb.exe2⤵PID:3024
-
-
C:\Windows\System\eoxiyCL.exeC:\Windows\System\eoxiyCL.exe2⤵PID:10432
-
-
C:\Windows\System\gIdTrWM.exeC:\Windows\System\gIdTrWM.exe2⤵PID:10492
-
-
C:\Windows\System\ChLSFvU.exeC:\Windows\System\ChLSFvU.exe2⤵PID:10564
-
-
C:\Windows\System\kYsSaYe.exeC:\Windows\System\kYsSaYe.exe2⤵PID:10620
-
-
C:\Windows\System\PDWMOkp.exeC:\Windows\System\PDWMOkp.exe2⤵PID:10684
-
-
C:\Windows\System\FHlvCQu.exeC:\Windows\System\FHlvCQu.exe2⤵PID:10744
-
-
C:\Windows\System\tZGOiXD.exeC:\Windows\System\tZGOiXD.exe2⤵PID:10816
-
-
C:\Windows\System\LCFkcPW.exeC:\Windows\System\LCFkcPW.exe2⤵PID:10884
-
-
C:\Windows\System\KgPQqiD.exeC:\Windows\System\KgPQqiD.exe2⤵PID:10944
-
-
C:\Windows\System\FgvXgwb.exeC:\Windows\System\FgvXgwb.exe2⤵PID:11016
-
-
C:\Windows\System\PrhiCjK.exeC:\Windows\System\PrhiCjK.exe2⤵PID:11080
-
-
C:\Windows\System\BCKQgUp.exeC:\Windows\System\BCKQgUp.exe2⤵PID:11156
-
-
C:\Windows\System\HBXcctV.exeC:\Windows\System\HBXcctV.exe2⤵PID:11220
-
-
C:\Windows\System\YCavUgH.exeC:\Windows\System\YCavUgH.exe2⤵PID:10284
-
-
C:\Windows\System\PmhOAJc.exeC:\Windows\System\PmhOAJc.exe2⤵PID:10396
-
-
C:\Windows\System\HDUPbhm.exeC:\Windows\System\HDUPbhm.exe2⤵PID:10544
-
-
C:\Windows\System\dNXFAMi.exeC:\Windows\System\dNXFAMi.exe2⤵PID:10660
-
-
C:\Windows\System\HcHJZCf.exeC:\Windows\System\HcHJZCf.exe2⤵PID:10800
-
-
C:\Windows\System\SbIwkvU.exeC:\Windows\System\SbIwkvU.exe2⤵PID:10972
-
-
C:\Windows\System\KMEXkum.exeC:\Windows\System\KMEXkum.exe2⤵PID:11136
-
-
C:\Windows\System\anSMyXl.exeC:\Windows\System\anSMyXl.exe2⤵PID:10268
-
-
C:\Windows\System\PUXJzPF.exeC:\Windows\System\PUXJzPF.exe2⤵PID:10832
-
-
C:\Windows\System\WfLCFQC.exeC:\Windows\System\WfLCFQC.exe2⤵PID:10932
-
-
C:\Windows\System\ZdGSFKm.exeC:\Windows\System\ZdGSFKm.exe2⤵PID:10256
-
-
C:\Windows\System\zjCgPnV.exeC:\Windows\System\zjCgPnV.exe2⤵PID:11056
-
-
C:\Windows\System\vnKupxV.exeC:\Windows\System\vnKupxV.exe2⤵PID:10876
-
-
C:\Windows\System\TAeyhlk.exeC:\Windows\System\TAeyhlk.exe2⤵PID:11292
-
-
C:\Windows\System\UNSkfTZ.exeC:\Windows\System\UNSkfTZ.exe2⤵PID:11320
-
-
C:\Windows\System\HYqrhbz.exeC:\Windows\System\HYqrhbz.exe2⤵PID:11348
-
-
C:\Windows\System\cOiToac.exeC:\Windows\System\cOiToac.exe2⤵PID:11376
-
-
C:\Windows\System\VwJHlMB.exeC:\Windows\System\VwJHlMB.exe2⤵PID:11404
-
-
C:\Windows\System\qVlQtek.exeC:\Windows\System\qVlQtek.exe2⤵PID:11432
-
-
C:\Windows\System\odotGcD.exeC:\Windows\System\odotGcD.exe2⤵PID:11460
-
-
C:\Windows\System\IcJSelZ.exeC:\Windows\System\IcJSelZ.exe2⤵PID:11488
-
-
C:\Windows\System\QWkmlyt.exeC:\Windows\System\QWkmlyt.exe2⤵PID:11516
-
-
C:\Windows\System\nwLpHEu.exeC:\Windows\System\nwLpHEu.exe2⤵PID:11544
-
-
C:\Windows\System\nMOiMOS.exeC:\Windows\System\nMOiMOS.exe2⤵PID:11576
-
-
C:\Windows\System\CgeppKr.exeC:\Windows\System\CgeppKr.exe2⤵PID:11600
-
-
C:\Windows\System\wfPuIDP.exeC:\Windows\System\wfPuIDP.exe2⤵PID:11640
-
-
C:\Windows\System\cAlfoMy.exeC:\Windows\System\cAlfoMy.exe2⤵PID:11676
-
-
C:\Windows\System\OYRWFVV.exeC:\Windows\System\OYRWFVV.exe2⤵PID:11692
-
-
C:\Windows\System\imaYVKB.exeC:\Windows\System\imaYVKB.exe2⤵PID:11720
-
-
C:\Windows\System\EEuLjqy.exeC:\Windows\System\EEuLjqy.exe2⤵PID:11756
-
-
C:\Windows\System\FvkJEGO.exeC:\Windows\System\FvkJEGO.exe2⤵PID:11772
-
-
C:\Windows\System\kDPuqwV.exeC:\Windows\System\kDPuqwV.exe2⤵PID:11792
-
-
C:\Windows\System\wCpfJZB.exeC:\Windows\System\wCpfJZB.exe2⤵PID:11848
-
-
C:\Windows\System\djGCadT.exeC:\Windows\System\djGCadT.exe2⤵PID:11864
-
-
C:\Windows\System\cjCWqwU.exeC:\Windows\System\cjCWqwU.exe2⤵PID:11892
-
-
C:\Windows\System\hfHWzTf.exeC:\Windows\System\hfHWzTf.exe2⤵PID:11960
-
-
C:\Windows\System\NuPzHqH.exeC:\Windows\System\NuPzHqH.exe2⤵PID:11988
-
-
C:\Windows\System\BVDcWUG.exeC:\Windows\System\BVDcWUG.exe2⤵PID:12016
-
-
C:\Windows\System\dxEEvfM.exeC:\Windows\System\dxEEvfM.exe2⤵PID:12044
-
-
C:\Windows\System\NqdwkYU.exeC:\Windows\System\NqdwkYU.exe2⤵PID:12072
-
-
C:\Windows\System\OJDnCqw.exeC:\Windows\System\OJDnCqw.exe2⤵PID:12104
-
-
C:\Windows\System\kEEaMDS.exeC:\Windows\System\kEEaMDS.exe2⤵PID:12128
-
-
C:\Windows\System\iIiCJuN.exeC:\Windows\System\iIiCJuN.exe2⤵PID:12156
-
-
C:\Windows\System\QxHtIow.exeC:\Windows\System\QxHtIow.exe2⤵PID:12184
-
-
C:\Windows\System\cJLNzbN.exeC:\Windows\System\cJLNzbN.exe2⤵PID:12220
-
-
C:\Windows\System\Lqaumxu.exeC:\Windows\System\Lqaumxu.exe2⤵PID:12240
-
-
C:\Windows\System\QYzFUpk.exeC:\Windows\System\QYzFUpk.exe2⤵PID:12268
-
-
C:\Windows\System\fLeisIy.exeC:\Windows\System\fLeisIy.exe2⤵PID:11284
-
-
C:\Windows\System\KMkYoiD.exeC:\Windows\System\KMkYoiD.exe2⤵PID:11344
-
-
C:\Windows\System\KcvMbkU.exeC:\Windows\System\KcvMbkU.exe2⤵PID:11416
-
-
C:\Windows\System\CbZUAvK.exeC:\Windows\System\CbZUAvK.exe2⤵PID:11480
-
-
C:\Windows\System\GGUnOOs.exeC:\Windows\System\GGUnOOs.exe2⤵PID:11540
-
-
C:\Windows\System\yLIiHWl.exeC:\Windows\System\yLIiHWl.exe2⤵PID:11596
-
-
C:\Windows\System\PAIJAXW.exeC:\Windows\System\PAIJAXW.exe2⤵PID:11616
-
-
C:\Windows\System\OfvRYDa.exeC:\Windows\System\OfvRYDa.exe2⤵PID:11620
-
-
C:\Windows\System\qrOWkPE.exeC:\Windows\System\qrOWkPE.exe2⤵PID:920
-
-
C:\Windows\System\XUgSvhS.exeC:\Windows\System\XUgSvhS.exe2⤵PID:432
-
-
C:\Windows\System\sBtoKDA.exeC:\Windows\System\sBtoKDA.exe2⤵PID:7120
-
-
C:\Windows\System\mphuWig.exeC:\Windows\System\mphuWig.exe2⤵PID:1796
-
-
C:\Windows\System\lMJvBpj.exeC:\Windows\System\lMJvBpj.exe2⤵PID:2120
-
-
C:\Windows\System\NvUhDYc.exeC:\Windows\System\NvUhDYc.exe2⤵PID:11744
-
-
C:\Windows\System\cUkuPPe.exeC:\Windows\System\cUkuPPe.exe2⤵PID:11780
-
-
C:\Windows\System\LnMNrgU.exeC:\Windows\System\LnMNrgU.exe2⤵PID:11900
-
-
C:\Windows\System\RcojSvM.exeC:\Windows\System\RcojSvM.exe2⤵PID:11732
-
-
C:\Windows\System\jUcNPyU.exeC:\Windows\System\jUcNPyU.exe2⤵PID:11984
-
-
C:\Windows\System\neJoDAp.exeC:\Windows\System\neJoDAp.exe2⤵PID:12056
-
-
C:\Windows\System\HXpsdFB.exeC:\Windows\System\HXpsdFB.exe2⤵PID:12120
-
-
C:\Windows\System\czFckMl.exeC:\Windows\System\czFckMl.exe2⤵PID:12180
-
-
C:\Windows\System\QQkQNKJ.exeC:\Windows\System\QQkQNKJ.exe2⤵PID:12252
-
-
C:\Windows\System\ApVOOEG.exeC:\Windows\System\ApVOOEG.exe2⤵PID:11332
-
-
C:\Windows\System\ezkxuIv.exeC:\Windows\System\ezkxuIv.exe2⤵PID:11472
-
-
C:\Windows\System\hHKBjiG.exeC:\Windows\System\hHKBjiG.exe2⤵PID:11588
-
-
C:\Windows\System\YMZqJTr.exeC:\Windows\System\YMZqJTr.exe2⤵PID:11632
-
-
C:\Windows\System\aeCaBzV.exeC:\Windows\System\aeCaBzV.exe2⤵PID:11924
-
-
C:\Windows\System\VJMYnLg.exeC:\Windows\System\VJMYnLg.exe2⤵PID:11752
-
-
C:\Windows\System\lpwTAHT.exeC:\Windows\System\lpwTAHT.exe2⤵PID:11816
-
-
C:\Windows\System\VNAKMVz.exeC:\Windows\System\VNAKMVz.exe2⤵PID:11824
-
-
C:\Windows\System\YdUgDUF.exeC:\Windows\System\YdUgDUF.exe2⤵PID:12084
-
-
C:\Windows\System\sqPMwsV.exeC:\Windows\System\sqPMwsV.exe2⤵PID:12232
-
-
C:\Windows\System\qEMejnO.exeC:\Windows\System\qEMejnO.exe2⤵PID:11452
-
-
C:\Windows\System\FXGyPva.exeC:\Windows\System\FXGyPva.exe2⤵PID:7128
-
-
C:\Windows\System\OZVNvxo.exeC:\Windows\System\OZVNvxo.exe2⤵PID:11740
-
-
C:\Windows\System\BXYmEFH.exeC:\Windows\System\BXYmEFH.exe2⤵PID:7092
-
-
C:\Windows\System\LWDTCnW.exeC:\Windows\System\LWDTCnW.exe2⤵PID:11396
-
-
C:\Windows\System\JPrfmxP.exeC:\Windows\System\JPrfmxP.exe2⤵PID:2088
-
-
C:\Windows\System\LOAFXaT.exeC:\Windows\System\LOAFXaT.exe2⤵PID:1924
-
-
C:\Windows\System\akDPogN.exeC:\Windows\System\akDPogN.exe2⤵PID:11980
-
-
C:\Windows\System\cJkcKbo.exeC:\Windows\System\cJkcKbo.exe2⤵PID:12308
-
-
C:\Windows\System\kYhqnQo.exeC:\Windows\System\kYhqnQo.exe2⤵PID:12336
-
-
C:\Windows\System\ySxmlqw.exeC:\Windows\System\ySxmlqw.exe2⤵PID:12364
-
-
C:\Windows\System\rGWULAi.exeC:\Windows\System\rGWULAi.exe2⤵PID:12392
-
-
C:\Windows\System\KVdYnqz.exeC:\Windows\System\KVdYnqz.exe2⤵PID:12420
-
-
C:\Windows\System\rBgudLJ.exeC:\Windows\System\rBgudLJ.exe2⤵PID:12448
-
-
C:\Windows\System\VNOBJnU.exeC:\Windows\System\VNOBJnU.exe2⤵PID:12476
-
-
C:\Windows\System\SGCDfOG.exeC:\Windows\System\SGCDfOG.exe2⤵PID:12504
-
-
C:\Windows\System\yWpQFXZ.exeC:\Windows\System\yWpQFXZ.exe2⤵PID:12536
-
-
C:\Windows\System\pWVSbmG.exeC:\Windows\System\pWVSbmG.exe2⤵PID:12564
-
-
C:\Windows\System\eAgnzuf.exeC:\Windows\System\eAgnzuf.exe2⤵PID:12592
-
-
C:\Windows\System\XZJjDoF.exeC:\Windows\System\XZJjDoF.exe2⤵PID:12620
-
-
C:\Windows\System\rcUfTXG.exeC:\Windows\System\rcUfTXG.exe2⤵PID:12648
-
-
C:\Windows\System\NFfbsnW.exeC:\Windows\System\NFfbsnW.exe2⤵PID:12676
-
-
C:\Windows\System\VwjjPLL.exeC:\Windows\System\VwjjPLL.exe2⤵PID:12704
-
-
C:\Windows\System\ilOtvfH.exeC:\Windows\System\ilOtvfH.exe2⤵PID:12732
-
-
C:\Windows\System\qoohAOB.exeC:\Windows\System\qoohAOB.exe2⤵PID:12760
-
-
C:\Windows\System\Xkiahee.exeC:\Windows\System\Xkiahee.exe2⤵PID:12788
-
-
C:\Windows\System\barDDNj.exeC:\Windows\System\barDDNj.exe2⤵PID:12816
-
-
C:\Windows\System\tYUnwXZ.exeC:\Windows\System\tYUnwXZ.exe2⤵PID:12844
-
-
C:\Windows\System\jIHDYSZ.exeC:\Windows\System\jIHDYSZ.exe2⤵PID:12872
-
-
C:\Windows\System\KgKVfZN.exeC:\Windows\System\KgKVfZN.exe2⤵PID:12900
-
-
C:\Windows\System\HCtyJtd.exeC:\Windows\System\HCtyJtd.exe2⤵PID:12928
-
-
C:\Windows\System\QcTDFOJ.exeC:\Windows\System\QcTDFOJ.exe2⤵PID:12956
-
-
C:\Windows\System\enVEvxu.exeC:\Windows\System\enVEvxu.exe2⤵PID:12984
-
-
C:\Windows\System\tCecCRV.exeC:\Windows\System\tCecCRV.exe2⤵PID:13012
-
-
C:\Windows\System\jqNlvXC.exeC:\Windows\System\jqNlvXC.exe2⤵PID:13040
-
-
C:\Windows\System\HeaqFxR.exeC:\Windows\System\HeaqFxR.exe2⤵PID:13084
-
-
C:\Windows\System\EZfFxlb.exeC:\Windows\System\EZfFxlb.exe2⤵PID:13100
-
-
C:\Windows\System\HImgfyv.exeC:\Windows\System\HImgfyv.exe2⤵PID:13128
-
-
C:\Windows\System\ghmdhJg.exeC:\Windows\System\ghmdhJg.exe2⤵PID:13156
-
-
C:\Windows\System\jIQPLxP.exeC:\Windows\System\jIQPLxP.exe2⤵PID:13184
-
-
C:\Windows\System\JDfQRXe.exeC:\Windows\System\JDfQRXe.exe2⤵PID:13212
-
-
C:\Windows\System\FwfpejY.exeC:\Windows\System\FwfpejY.exe2⤵PID:13240
-
-
C:\Windows\System\iLahfeN.exeC:\Windows\System\iLahfeN.exe2⤵PID:13268
-
-
C:\Windows\System\oAKcvHe.exeC:\Windows\System\oAKcvHe.exe2⤵PID:13296
-
-
C:\Windows\System\yrDkZzU.exeC:\Windows\System\yrDkZzU.exe2⤵PID:12320
-
-
C:\Windows\System\HUnaBTP.exeC:\Windows\System\HUnaBTP.exe2⤵PID:12384
-
-
C:\Windows\System\qVIWCIh.exeC:\Windows\System\qVIWCIh.exe2⤵PID:12444
-
-
C:\Windows\System\rNisfMI.exeC:\Windows\System\rNisfMI.exe2⤵PID:12520
-
-
C:\Windows\System\EAObOkK.exeC:\Windows\System\EAObOkK.exe2⤵PID:12588
-
-
C:\Windows\System\uCqEwaZ.exeC:\Windows\System\uCqEwaZ.exe2⤵PID:12660
-
-
C:\Windows\System\ykwULfI.exeC:\Windows\System\ykwULfI.exe2⤵PID:12724
-
-
C:\Windows\System\gjPiBAq.exeC:\Windows\System\gjPiBAq.exe2⤵PID:12784
-
-
C:\Windows\System\huWLAkh.exeC:\Windows\System\huWLAkh.exe2⤵PID:12868
-
-
C:\Windows\System\DFNdyvw.exeC:\Windows\System\DFNdyvw.exe2⤵PID:12920
-
-
C:\Windows\System\JTMlVuW.exeC:\Windows\System\JTMlVuW.exe2⤵PID:12980
-
-
C:\Windows\System\AHraJTA.exeC:\Windows\System\AHraJTA.exe2⤵PID:13052
-
-
C:\Windows\System\AeDOlzv.exeC:\Windows\System\AeDOlzv.exe2⤵PID:13120
-
-
C:\Windows\System\dHYvOkv.exeC:\Windows\System\dHYvOkv.exe2⤵PID:13176
-
-
C:\Windows\System\QTwocBS.exeC:\Windows\System\QTwocBS.exe2⤵PID:13236
-
-
C:\Windows\System\IsCfvyO.exeC:\Windows\System\IsCfvyO.exe2⤵PID:13308
-
-
C:\Windows\System\WlSpWTO.exeC:\Windows\System\WlSpWTO.exe2⤵PID:12432
-
-
C:\Windows\System\kBpGmoG.exeC:\Windows\System\kBpGmoG.exe2⤵PID:12584
-
-
C:\Windows\System\IRUeDdS.exeC:\Windows\System\IRUeDdS.exe2⤵PID:12752
-
-
C:\Windows\System\LdbycZn.exeC:\Windows\System\LdbycZn.exe2⤵PID:12896
-
-
C:\Windows\System\FADWvZv.exeC:\Windows\System\FADWvZv.exe2⤵PID:13036
-
-
C:\Windows\System\VKbGZlT.exeC:\Windows\System\VKbGZlT.exe2⤵PID:13204
-
-
C:\Windows\System\AgrFEaR.exeC:\Windows\System\AgrFEaR.exe2⤵PID:12376
-
-
C:\Windows\System\gdgBIiB.exeC:\Windows\System\gdgBIiB.exe2⤵PID:12716
-
-
C:\Windows\System\UnEydGd.exeC:\Windows\System\UnEydGd.exe2⤵PID:13112
-
-
C:\Windows\System\heYWRUF.exeC:\Windows\System\heYWRUF.exe2⤵PID:12644
-
-
C:\Windows\System\CWkVPzg.exeC:\Windows\System\CWkVPzg.exe2⤵PID:12548
-
-
C:\Windows\System\EiKNdxB.exeC:\Windows\System\EiKNdxB.exe2⤵PID:13328
-
-
C:\Windows\System\angTJLS.exeC:\Windows\System\angTJLS.exe2⤵PID:13356
-
-
C:\Windows\System\OUyArqw.exeC:\Windows\System\OUyArqw.exe2⤵PID:13384
-
-
C:\Windows\System\SDaQdOa.exeC:\Windows\System\SDaQdOa.exe2⤵PID:13412
-
-
C:\Windows\System\CpHlZWt.exeC:\Windows\System\CpHlZWt.exe2⤵PID:13440
-
-
C:\Windows\System\YMYUcun.exeC:\Windows\System\YMYUcun.exe2⤵PID:13468
-
-
C:\Windows\System\OyRamQu.exeC:\Windows\System\OyRamQu.exe2⤵PID:13496
-
-
C:\Windows\System\renLhFg.exeC:\Windows\System\renLhFg.exe2⤵PID:13524
-
-
C:\Windows\System\RzznrOr.exeC:\Windows\System\RzznrOr.exe2⤵PID:13552
-
-
C:\Windows\System\xpXSupF.exeC:\Windows\System\xpXSupF.exe2⤵PID:13584
-
-
C:\Windows\System\CmjwqJW.exeC:\Windows\System\CmjwqJW.exe2⤵PID:13612
-
-
C:\Windows\System\GKtmtjg.exeC:\Windows\System\GKtmtjg.exe2⤵PID:13640
-
-
C:\Windows\System\aatRqlW.exeC:\Windows\System\aatRqlW.exe2⤵PID:13668
-
-
C:\Windows\System\CWNDUqK.exeC:\Windows\System\CWNDUqK.exe2⤵PID:13696
-
-
C:\Windows\System\DhjKUzy.exeC:\Windows\System\DhjKUzy.exe2⤵PID:13724
-
-
C:\Windows\System\UsEtece.exeC:\Windows\System\UsEtece.exe2⤵PID:13752
-
-
C:\Windows\System\pSvpIrP.exeC:\Windows\System\pSvpIrP.exe2⤵PID:13780
-
-
C:\Windows\System\ANgbGmN.exeC:\Windows\System\ANgbGmN.exe2⤵PID:13808
-
-
C:\Windows\System\JblCPNU.exeC:\Windows\System\JblCPNU.exe2⤵PID:13836
-
-
C:\Windows\System\AJVnHfI.exeC:\Windows\System\AJVnHfI.exe2⤵PID:13864
-
-
C:\Windows\System\hHnAqmE.exeC:\Windows\System\hHnAqmE.exe2⤵PID:13892
-
-
C:\Windows\System\ZspBgwv.exeC:\Windows\System\ZspBgwv.exe2⤵PID:13920
-
-
C:\Windows\System\fptgkqL.exeC:\Windows\System\fptgkqL.exe2⤵PID:13948
-
-
C:\Windows\System\cdxDCzk.exeC:\Windows\System\cdxDCzk.exe2⤵PID:13976
-
-
C:\Windows\System\VaTrhnz.exeC:\Windows\System\VaTrhnz.exe2⤵PID:14004
-
-
C:\Windows\System\RXYecAG.exeC:\Windows\System\RXYecAG.exe2⤵PID:14032
-
-
C:\Windows\System\fwqMjue.exeC:\Windows\System\fwqMjue.exe2⤵PID:14064
-
-
C:\Windows\System\PeZBPuV.exeC:\Windows\System\PeZBPuV.exe2⤵PID:14088
-
-
C:\Windows\System\UuUxtRD.exeC:\Windows\System\UuUxtRD.exe2⤵PID:14124
-
-
C:\Windows\System\ZRkatjn.exeC:\Windows\System\ZRkatjn.exe2⤵PID:14152
-
-
C:\Windows\System\qqqwyFK.exeC:\Windows\System\qqqwyFK.exe2⤵PID:14184
-
-
C:\Windows\System\NrdpAhE.exeC:\Windows\System\NrdpAhE.exe2⤵PID:14224
-
-
C:\Windows\System\VLJguzi.exeC:\Windows\System\VLJguzi.exe2⤵PID:14268
-
-
C:\Windows\System\ZepozNL.exeC:\Windows\System\ZepozNL.exe2⤵PID:14308
-
-
C:\Windows\System\rgINnSC.exeC:\Windows\System\rgINnSC.exe2⤵PID:12348
-
-
C:\Windows\System\VnbRkBU.exeC:\Windows\System\VnbRkBU.exe2⤵PID:12556
-
-
C:\Windows\System\PSpIFdD.exeC:\Windows\System\PSpIFdD.exe2⤵PID:13460
-
-
C:\Windows\System\ZuTIVBi.exeC:\Windows\System\ZuTIVBi.exe2⤵PID:13492
-
-
C:\Windows\System\raJZAOv.exeC:\Windows\System\raJZAOv.exe2⤵PID:13564
-
-
C:\Windows\System\TimXmjD.exeC:\Windows\System\TimXmjD.exe2⤵PID:4044
-
-
C:\Windows\System\NRqdTYp.exeC:\Windows\System\NRqdTYp.exe2⤵PID:13632
-
-
C:\Windows\System\KapMtCv.exeC:\Windows\System\KapMtCv.exe2⤵PID:13692
-
-
C:\Windows\System\xgSTnAV.exeC:\Windows\System\xgSTnAV.exe2⤵PID:13764
-
-
C:\Windows\System\PjCCyef.exeC:\Windows\System\PjCCyef.exe2⤵PID:13828
-
-
C:\Windows\System\xuBUXAi.exeC:\Windows\System\xuBUXAi.exe2⤵PID:13888
-
-
C:\Windows\System\AILMpzW.exeC:\Windows\System\AILMpzW.exe2⤵PID:13960
-
-
C:\Windows\System\MYERDPs.exeC:\Windows\System\MYERDPs.exe2⤵PID:14024
-
-
C:\Windows\System\ycTczOV.exeC:\Windows\System\ycTczOV.exe2⤵PID:14076
-
-
C:\Windows\System\wdKRAFT.exeC:\Windows\System\wdKRAFT.exe2⤵PID:14112
-
-
C:\Windows\System\cpqMWST.exeC:\Windows\System\cpqMWST.exe2⤵PID:1156
-
-
C:\Windows\System\GSktEHS.exeC:\Windows\System\GSktEHS.exe2⤵PID:14204
-
-
C:\Windows\System\bJVGYbI.exeC:\Windows\System\bJVGYbI.exe2⤵PID:1228
-
-
C:\Windows\System\ULimFeS.exeC:\Windows\System\ULimFeS.exe2⤵PID:14296
-
-
C:\Windows\System\xOOKofS.exeC:\Windows\System\xOOKofS.exe2⤵PID:14256
-
-
C:\Windows\System\mnZABPi.exeC:\Windows\System\mnZABPi.exe2⤵PID:13408
-
-
C:\Windows\System\dgBRFHW.exeC:\Windows\System\dgBRFHW.exe2⤵PID:13548
-
-
C:\Windows\System\nlaoNqt.exeC:\Windows\System\nlaoNqt.exe2⤵PID:13660
-
-
C:\Windows\System\Ekorpck.exeC:\Windows\System\Ekorpck.exe2⤵PID:13804
-
-
C:\Windows\System\iGNWwJY.exeC:\Windows\System\iGNWwJY.exe2⤵PID:13944
-
-
C:\Windows\System\sgaNyfb.exeC:\Windows\System\sgaNyfb.exe2⤵PID:2752
-
-
C:\Windows\System\nmVozMq.exeC:\Windows\System\nmVozMq.exe2⤵PID:5036
-
-
C:\Windows\System\LTBhJQd.exeC:\Windows\System\LTBhJQd.exe2⤵PID:4084
-
-
C:\Windows\System\OoMTpTs.exeC:\Windows\System\OoMTpTs.exe2⤵PID:14212
-
-
C:\Windows\System\GxSldtY.exeC:\Windows\System\GxSldtY.exe2⤵PID:1388
-
-
C:\Windows\System\DxApaBW.exeC:\Windows\System\DxApaBW.exe2⤵PID:4520
-
-
C:\Windows\System\TAZGbUq.exeC:\Windows\System\TAZGbUq.exe2⤵PID:412
-
-
C:\Windows\System\QUPulfX.exeC:\Windows\System\QUPulfX.exe2⤵PID:1216
-
-
C:\Windows\System\VmixGoK.exeC:\Windows\System\VmixGoK.exe2⤵PID:13720
-
-
C:\Windows\System\VGmiMBz.exeC:\Windows\System\VGmiMBz.exe2⤵PID:1576
-
-
C:\Windows\System\pJKIqBX.exeC:\Windows\System\pJKIqBX.exe2⤵PID:14140
-
-
C:\Windows\System\Ldxcedx.exeC:\Windows\System\Ldxcedx.exe2⤵PID:2976
-
-
C:\Windows\System\EeZrfFY.exeC:\Windows\System\EeZrfFY.exe2⤵PID:4128
-
-
C:\Windows\System\fODmOWk.exeC:\Windows\System\fODmOWk.exe2⤵PID:14260
-
-
C:\Windows\System\vAPAGsU.exeC:\Windows\System\vAPAGsU.exe2⤵PID:212
-
-
C:\Windows\System\ThZcsOF.exeC:\Windows\System\ThZcsOF.exe2⤵PID:4160
-
-
C:\Windows\System\YqZsjsO.exeC:\Windows\System\YqZsjsO.exe2⤵PID:872
-
-
C:\Windows\System\inLzEkS.exeC:\Windows\System\inLzEkS.exe2⤵PID:4020
-
-
C:\Windows\System\UuwpdWM.exeC:\Windows\System\UuwpdWM.exe2⤵PID:4100
-
-
C:\Windows\System\PDnLVvG.exeC:\Windows\System\PDnLVvG.exe2⤵PID:4620
-
-
C:\Windows\System\nXqFGvh.exeC:\Windows\System\nXqFGvh.exe2⤵PID:4696
-
-
C:\Windows\System\adrcNDU.exeC:\Windows\System\adrcNDU.exe2⤵PID:548
-
-
C:\Windows\System\VitqOHU.exeC:\Windows\System\VitqOHU.exe2⤵PID:13380
-
-
C:\Windows\System\euuOisN.exeC:\Windows\System\euuOisN.exe2⤵PID:4168
-
-
C:\Windows\System\TyCtPdO.exeC:\Windows\System\TyCtPdO.exe2⤵PID:3304
-
-
C:\Windows\System\tyHGFni.exeC:\Windows\System\tyHGFni.exe2⤵PID:4852
-
-
C:\Windows\System\tWboMxm.exeC:\Windows\System\tWboMxm.exe2⤵PID:1648
-
-
C:\Windows\System\iDTJQaV.exeC:\Windows\System\iDTJQaV.exe2⤵PID:2004
-
-
C:\Windows\System\MRTpZWZ.exeC:\Windows\System\MRTpZWZ.exe2⤵PID:2568
-
-
C:\Windows\System\hlhhurG.exeC:\Windows\System\hlhhurG.exe2⤵PID:4832
-
-
C:\Windows\System\tnVBDow.exeC:\Windows\System\tnVBDow.exe2⤵PID:14016
-
-
C:\Windows\System\HZioVli.exeC:\Windows\System\HZioVli.exe2⤵PID:552
-
-
C:\Windows\System\QbVYeQe.exeC:\Windows\System\QbVYeQe.exe2⤵PID:1876
-
-
C:\Windows\System\pNIpuij.exeC:\Windows\System\pNIpuij.exe2⤵PID:4424
-
-
C:\Windows\System\XQYmROH.exeC:\Windows\System\XQYmROH.exe2⤵PID:2080
-
-
C:\Windows\System\qTCzyUK.exeC:\Windows\System\qTCzyUK.exe2⤵PID:940
-
-
C:\Windows\System\vsVuuic.exeC:\Windows\System\vsVuuic.exe2⤵PID:3548
-
-
C:\Windows\System\CPJvBhZ.exeC:\Windows\System\CPJvBhZ.exe2⤵PID:2260
-
-
C:\Windows\System\hcsvgZf.exeC:\Windows\System\hcsvgZf.exe2⤵PID:4080
-
-
C:\Windows\System\hISyiYX.exeC:\Windows\System\hISyiYX.exe2⤵PID:3084
-
-
C:\Windows\System\OoPzRIA.exeC:\Windows\System\OoPzRIA.exe2⤵PID:4872
-
-
C:\Windows\System\yXEoyKb.exeC:\Windows\System\yXEoyKb.exe2⤵PID:14356
-
-
C:\Windows\System\rTzPRWm.exeC:\Windows\System\rTzPRWm.exe2⤵PID:14384
-
-
C:\Windows\System\tprvulo.exeC:\Windows\System\tprvulo.exe2⤵PID:14412
-
-
C:\Windows\System\ZOVFZYA.exeC:\Windows\System\ZOVFZYA.exe2⤵PID:14440
-
-
C:\Windows\System\RDxGKHo.exeC:\Windows\System\RDxGKHo.exe2⤵PID:14468
-
-
C:\Windows\System\Appkmaf.exeC:\Windows\System\Appkmaf.exe2⤵PID:14496
-
-
C:\Windows\System\ElfXgDQ.exeC:\Windows\System\ElfXgDQ.exe2⤵PID:14524
-
-
C:\Windows\System\aPwvKsc.exeC:\Windows\System\aPwvKsc.exe2⤵PID:14552
-
-
C:\Windows\System\HJJDAxW.exeC:\Windows\System\HJJDAxW.exe2⤵PID:14580
-
-
C:\Windows\System\wSePmWQ.exeC:\Windows\System\wSePmWQ.exe2⤵PID:14608
-
-
C:\Windows\System\kVnMwXd.exeC:\Windows\System\kVnMwXd.exe2⤵PID:14636
-
-
C:\Windows\System\UJQEPUn.exeC:\Windows\System\UJQEPUn.exe2⤵PID:14664
-
-
C:\Windows\System\yBLDjOv.exeC:\Windows\System\yBLDjOv.exe2⤵PID:14692
-
-
C:\Windows\System\EMFvpuG.exeC:\Windows\System\EMFvpuG.exe2⤵PID:14720
-
-
C:\Windows\System\EMiAJsR.exeC:\Windows\System\EMiAJsR.exe2⤵PID:14748
-
-
C:\Windows\System\NAyacQv.exeC:\Windows\System\NAyacQv.exe2⤵PID:14776
-
-
C:\Windows\System\YqHqRXW.exeC:\Windows\System\YqHqRXW.exe2⤵PID:14804
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:15168 -
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:15324
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5228
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5368
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6728
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:7372
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:7764
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:7724
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SendNotifyMessage
PID:10540
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:756
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SendNotifyMessage
PID:3652
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4280
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3576
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:10424
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3772
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:11356
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:14800
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6824
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:12008
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:8744
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5264
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:13068
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:9300
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:9468
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:9460
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:9884
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:9284
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3076
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:10996
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:13488
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:11792
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:14588
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:12108
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4136
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6196
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4760
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:14488
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:11928
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:14196
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:7028
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2156
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2976
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:8348
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6420
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6844
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:8572
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:8792
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:8980
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:13776
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:8016
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:10100
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7480
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:11188
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5996
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:14448
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TL6V2938\microsoft.windows[1].xml
Filesize97B
MD55159d72145959cb18a43ea3fc2eae839
SHA1f07321b18827ad81e531839dc7bd3c9bf5245a9a
SHA2562b07a7e7e9edca0814591a799827909028c846ad531ffe4d1d84bcbe67e22104
SHA512aae7652ff30a260d8c629760745893a42846d8db8f39406ac0b5360fe98aff571d911c87b2db9d929c04085876b5623b8e52cfd2ba758b92732bc978ddf87f53
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133827607041740352.txt
Filesize75KB
MD542dde3b074456388ad212032bc91e94f
SHA12190c31fb020febcc50474d7892802f867c5f940
SHA2565e56274db0c3891d84ff8ce437fcd770761baf2018a52c8ff282e88afe247c44
SHA5122c2c4a58ab154ebf1e365e10b7f1a4b620b866d276428bcaa84da18472c913128b30f0509e9571ac413dce4882556a719fc0b8d97decf5121989b2ea393e2b64
-
Filesize
6.0MB
MD5b3469d2edd94f0d5ae67cc0c4444de1c
SHA1cdd260f31d46ade72557a1bf9d804da381db7b86
SHA25660c4f0b36fca02ea01a3f26d6a427cb7d471b6d5e6fc3af586b8d2efeb92aa17
SHA512d80063a846071c6cb3a696c1a51a3665617112ee6f84cf2b2ef7623a02d20e8ca8ee2ecc8f47d41c96de983c97fb8758cd183c7fac4f084fc2754ca1a53c02e6
-
Filesize
6.0MB
MD5fbeaf684bb25192de21cb624bd627f9a
SHA1edb3a50a91e271cec774e38c7b634230b7899c43
SHA2569e7b29b3a9a6e2eb428c7afb5ac103c1b2e2d02b3dede866c41521e5db88d112
SHA512efa9a5964e82c835122b347970dd36a303491cb6df53c6d6986e597bd7e5d44387868c72311b54948801dde6a93846ccb325d5fb203349daa9930cbacf51f76c
-
Filesize
6.0MB
MD57bfdd539440dfe82ba7e1dbff5692312
SHA11675237235261d430b15e27c1bfba16baf00fab7
SHA256ce1fd44d4256f3c65b01ea18b79db58f8d2ea2f3be680f0a08ddf8de99318f77
SHA5125f8a02a2bcb95be51ae021b0f5d398f4da05ccf84b703da4631cc53420bb5a5a52c7e086c006dba0cc219be60b707cb6588db0dbe9f6d8e9d6980b994eef6cd0
-
Filesize
6.0MB
MD5319f2a87944b7a595d994297f76ef239
SHA1154bccb019911a0e92f34fc5e212a192bf879879
SHA2566c44ee9bc3028279b7da20f0b5465b5c1ef8554db41a5596292f2f8e57be2448
SHA512d30ebf72d6fdeb49416f25062ae58f898126d1068f80e5ecaa1a8b2f0631b3052c482733e7a4dc2d5c2da2b4ce8cdcf2d1ec465a85eebb819a63356e60942c1a
-
Filesize
6.0MB
MD5f2b457c3a1a8d14488e14eba4ffdf2e2
SHA1c5e1fd8d94ca5a85ce5014a32ef5a9be03bef7d0
SHA25616cce00d5fd218e9f50bde884ba907b22364fcc0e7813ff8c34be818193b4ff7
SHA512874a5fbe7363c387c147ebfbdeb5e9c0d1619c1a859dcacffdc6a217aaa7c544282a6562ae68fc5c177416364e0b441031b75d0d81843335da0babddfdd12028
-
Filesize
6.0MB
MD50a7b0182fb5e450706803732a9ebe6f2
SHA1ca35e191607c7ff315075bcb5d360dd8a3d4e6ae
SHA25675ea8c537397544a8fc877cf7e0fc0736f5eb77d3fb13a0c1262de28b1dcfe31
SHA512a32379b7dd44e2186253a22b33250cf9409adf8fc2101f2cbdf8efc64aec4cad2ad0495460552081bb7e10344b77917e105adc7b3ea0f1176fe622f1b309a61e
-
Filesize
6.0MB
MD5a2b291b943df82c0f5035b6b812d15f5
SHA1f9c23647137f574ed29723c74b20564b191d1a83
SHA2566516c5b97ffb5273a604afe9c1a9bca9d19058da6cbecb4dd72b84320f8b0282
SHA512551e4a95129ce2acdddb26901d5023007387e9b0cfed284bc0e9bb145c02250c8d8b1c217dc3390c0f1de2eda3efa18e3494c8053b76b7dde17988019d4412fd
-
Filesize
6.0MB
MD5ae1dd3c3d31ea2513710dd3b97354752
SHA177d55c90655ccedd185c6199d962d4cf947e40a9
SHA2567832387be5980f97a2df163d919b3dfe4b4769c4d89ef2a03f547ae479c25278
SHA512435a720861948e6c1d907ff3d1bedab0716c458e4b9f1038db9e4bb0ef49171ae6cc8288ad3ca629583bb24f1d6f300bfa29a548789f7742cf012c2b08c2f3d8
-
Filesize
6.0MB
MD5169ce28f0252c0382fb07c6952056550
SHA18c33e19836beb906e69348f1386e065ef94fb3f4
SHA25672e5cb18602d50f19a45aab50d70be9e5556dd2d6a783b79762dafef9285ba87
SHA5120318c9d77e66dfe731848a0359a3dedf559ad07fe8b392060a806661a41b3f8b3868eb928b530e3029d62e9f87a0c4eea09f079a869a8079df95c1fc63677999
-
Filesize
6.0MB
MD50a23dbe2f023f0ef2fa5857630b59750
SHA172b424fdef0e76972f9d99cc800b22174889ca04
SHA256b63f5eef96b625eb06a933c02daf21012fddd596501089bf373ae3b4d9b6b531
SHA5126abac400804221655d52e580bd8686c56b52c9985c999724a768b112180f778559097d5262dd2dd6eeebcdae01fbc5dfcc13c0d25d8e54f057b72cafcfb40bab
-
Filesize
6.0MB
MD51196d85f8588034f1e7e82d20996533e
SHA1523116c40fac1aa809503480f7a374dacf76a940
SHA2563a27a76ae1ebebe7706cbb643210ba7f5630eafeb85ff01085dee21eedc21f6b
SHA51225b408f1bc561f0a9a9faace8c95b8605ccffdbbbf85d06587759664fb38ca826d1ebd427fbc28d3f5f05986a6cdb3e1b894f20c87e40e7a51b35998b225e8ad
-
Filesize
6.0MB
MD524f504fabb88baf25bfa698d82f618b1
SHA1adfa4691d118d9f2cefb8ac748bbab3b3eb91381
SHA2568abdc45dffc03ca089d66517209c3b509e47da38f7f73f26f583c28355fb914d
SHA51201edb7f920164f2826c0d0827f7031e7b5640ae837a8dbdde6056f6dd179b370267439debd1f7b01e0a80b25c818234d77d26948896e22f68778e9e3e1545609
-
Filesize
6.0MB
MD5405ff5ff498b27f88c066d537631af12
SHA10b389daa949f01075f23bc6ab48a18dfcd63c28a
SHA256dc7a7bfea538e9d0525df3602fac70969c63256af53ddc19bd1e3882e064a3ae
SHA51214495e0db50407f58ba37b88e3e7fe91f8babf0e68ef686b5713c7e385abe86cd0ffe38d5c06e069f1350b5c3d87ff88aae53d6caff3a5e0fe6100182ee80d26
-
Filesize
6.0MB
MD5e0da63cb16810b7aec35e446987895ed
SHA1187efcacbb5cbc725e69cfde7e59598df868eb8f
SHA2563b04d05cb627e20de54c27e9a313459595fde3cea35bf7635909dbe0d6f7a995
SHA512b469a2f890c1b570df0fb2ffdaf54540a30a434b4dbbea218434f83e4c35fcb00f64e3f5b37b2caf3426a75dfad3083289972c3b65000331a870a3764e9d0866
-
Filesize
6.0MB
MD5dabb25e369560347b700ef7cdbab0c29
SHA1f22ee6db8d5aed621ebb75e0b2bf63e2f6ea9424
SHA256b84245534a2d5522cce995e56ffd02a79105d10394fd845b5b79c16e3245654c
SHA51228e7d68f75f275c0abf44f753169171cb8790f87c7af5dd02e68f74bcf57026398ee71e109db6cd66a7e84d5420166a90b6e5b533767b83ab41359717be7d1a8
-
Filesize
6.0MB
MD58271b5a51f0c6831247801725a12e180
SHA1a4c8bd8d05a70a80d94c4aa326dfabe8235d8caa
SHA2566c5b1ec59b77cf6edc7a3c3d91ba886e5e368fce9cdf120365c26a433b051ea3
SHA512223c4e95b004e6102f17c4517199766e0b34b329e333f657d9b335d06a827c8ae6f3fdd5b2fc17d92ad4ae6e4435edd458965df8b25c9f4c46910075143e1e8e
-
Filesize
6.0MB
MD503a76c57020413ccb87934460c134973
SHA1fe7265fc3a2f27232191041c361d6f06de4c3011
SHA256fa50f8dadc7583ba47ecedeacb21f9120b793a37446804e3706472a03ee9b7c9
SHA51233b4b4181c3d40aec0f53dac7fcaacd0c4ef9a0ecdc8106eaccad52cb103b72e8e6e0b79b67dec4b13a8c117b15fbcf57c5d3e7dc4f7fdc7d8d0ce49322f8ebb
-
Filesize
6.0MB
MD54b36574caef4759a8251622407c589a2
SHA151d2d727f07f8cea9d30cac17cdc57a81a9ab6df
SHA256288ad309d06b99c359a783d97dd9f2ffb90600005b401471dd73bfdfa90b20c9
SHA512999331fde577d386e075f87f6e65f56ccbe9205baab285d6d6e68c8b81ad50a08e899272b479d376d921eb47c89dc055c54f159bf81f59a2fb0995ecd32816b6
-
Filesize
6.0MB
MD5175caf1702debd07677d9e72036ff0a3
SHA12479b61dccae821c0324fcc6d760673262de8cb4
SHA2560ed435df7bd6d9dd275887beb2fd957b6b43fe1272e986b90bffb2d0d137eb02
SHA51253ec646621389e110b05f0e3842cd508ddd4ffb3095f4ba2c8e5291308631a0d020346cf5d0d5d69be3e81493d80756b42d87f2ff4aa9b7c9a20d01a86e6ff27
-
Filesize
6.0MB
MD53c01680bb0a76975ab4b9380b703a474
SHA16cc2befe41f5326806588c82df47cf32abe70117
SHA2565905ebc48a00439020ef371174331d5b81557510a76de76477ca278ca789ec66
SHA512c712520c981b8c2c8a89f7ea2acd2eb5bf4d28a8f932a4828be523e793158d7fb3168fd0af0b34037dc9096ac143199bbdcb1e02a926ceeb566238ec2860f5ca
-
Filesize
6.0MB
MD5fe947c15ee49a2a81b540e74633eae54
SHA17bbc99189e13b4624c227afa2e1618c4465fc9c6
SHA256287d574d7d7be7849f422d7469c161a39156895684435ad64ecc0362adfaf746
SHA512c921754dc63bbec713b543715c08366df3373bde07cfcb530195aac8575bbd7b462b2fe3977b52fe4398ecc4cbec881599ce2bd7eec9612f097ab8cbbd027cd4
-
Filesize
6.0MB
MD55feef185d00b1ad97ae04b15ccf55930
SHA11600c2bf95cebe9e1c3df9be30842b2e5dff6082
SHA256a87cc2d120e1a3dba5159dc65cca79cfbd4f0c01d12bc4dc6d0a41f791dd2be4
SHA512f66f907443b42047e75d1d17f55963720199a1f78c31b874fd85fab02288ac2fd6e76ec99dda6e7bac1800f826172db4343d6971e4586c1693a52921f2d71897
-
Filesize
6.0MB
MD5e6040dd446233de594854e21df703b65
SHA115f5aac693d7c427ad554f1b7d5c186616ab036d
SHA2567d2bf3d9ca3bc8458d7e6337bcccff2517beb574a215caf67f40df5359c7f229
SHA512ff3965f71effc72eaab6ffe184f1ad25b4499d4584a3e38c8ecf3b968c9b886de3e983ccffafaaab08e9ca7e7ceb11a776dd31b1a36ad1e6e7fbb9ca17af1adf
-
Filesize
6.0MB
MD5bd5f97cf14610803f24b699e52195966
SHA1b8c5a4fa97a0638f3244acd6d1d79d7654c60791
SHA256413235a26a521e15ef3f53f4d6f0f3d26c5151e720e7a7ead1f183f391882a17
SHA512367b206ad49c6c46f8a521a99823ffbf5dcfc05c54c34f78b33415373fce49bc06aa70f06d34573fcc863736614b93afcaff0c2324c658fb0253844e632d9051
-
Filesize
6.0MB
MD5c2b721e0b3e42f97412b9b7b5aa28aae
SHA1f12b4c70586977fd2b8c1d0492cd8fb86d3874e6
SHA256e58d99d677674d38d31090afcec323322f6a4b9d2f7df4801a9a677f3d71832a
SHA5120ad1de30e6fff63866c21102d4e4b76e394f7ce47aac755e0b38f22529f840cbee8db576dc05734a2c6d11cf2c353bb033fc3abad9ebc0d57d9581653ad792bf
-
Filesize
6.0MB
MD5eefcfd4d73823e4fdbd72039de963671
SHA1854978725bc284be2e3a36d539e2f9f33663fab5
SHA256ca0ba2fe96d9b71f47d328bc786a36c86df5c65a393302a3c20c6d106cdd6954
SHA512c0951b1ee84ca583cfe82daa825915ea7a3a4e56eb5b09fb3def1e825edd90cbbb48db22515f18438b28883f7eb109f9330fc4bb97f45f18296021a4d0688c8f
-
Filesize
6.0MB
MD57223e96b34342c13b792c7968fa49f0e
SHA10b555dc3dca0d821129f7a94baefd83a1fadcdfd
SHA256efe3744f4b512c91cfcdfe65f1c7c4207390c5bddd21253761c95e091f09dce6
SHA5128d09e88e762e65ceb34c9f01c3d2a62d5ad8c35068698841990ce4da5a4b1800456f390716fa1444fc63186b8376d0fbcb2a7d0d0d99c96bc48d4f55c4af65bb
-
Filesize
6.0MB
MD5418f3ac934c96fa3addffd851044cb83
SHA1ae9b10292f9255cee2124558056d78117afaf663
SHA256fd5bb3433b69ff80b468e8bea63f59d5978246f0179fcd773c9a64301f14e7ae
SHA512bd83c11efbe9fcec700749ca9abbf0a3e496f1f4b7e2c34fc696abd881d0e6ed143f1c2176f7eee3cf11c5e611dcaf22d87fe3858a9a79d52191fe4a8b491818
-
Filesize
6.0MB
MD5fcd7297df714c54b60e971cbd2590378
SHA1c2315bcb69a8c3246077047612890a1ce84d48ff
SHA256dc5aac1bfea58a6c25105ae3a853c481e2f468c20a47df09f0548d256406cf50
SHA51235a8ce353ee5917d0c8d4a32a3924a63b3a5f7c9c01318d37f71530b261c509019391705a036dcab78bda57f2d109ce88ae57b2162f6e3a631d002dd1b2e885c
-
Filesize
6.0MB
MD5ad604776517be37cb4c7cda927dc22d0
SHA18c988ed0332c94e067dc42a5fb34fb7890f28b39
SHA256076b1d772258da788d5bc5fc72552524ac476bbe5f2367e113e2ba44fd8a6245
SHA512061dd895a5626723781340ea08c1ac44707fe4b754e38aeb12e29398bfd2043d4f4a3f801d1d6cd9a6c36cb63de26e65e88a0581e9ad02b5d7d8f74b58c84413
-
Filesize
6.0MB
MD591d2b241407f5ed2e315220236bc7bce
SHA1b3ba4c9a0657112a8289336ae0df7ec617064eba
SHA2561a9b4a505b7b1ba8591e6d51d21057981bc9814bd74f60893a61a740ab534c27
SHA5120b506f16179d8e4bfee48c1083d8061575873474a414ddcf0618405b09bbccb349063177bd670bf0f35be47529e06b52b0c7a47f114cf31b9b611732090c828b
-
Filesize
6.0MB
MD5666528124d66ca9e8ca263bd4fb86b3b
SHA111aff915ae253d373500dea4107d3c4fd8d5d7e3
SHA256a7cc36092361c976b6ede0ba98fd7eb1b07e27d3ed23c60ff0710ca4fd870e22
SHA512b362195ab4e8067c23f4d4ab031fd74cebdfe4cba5899aee253574d52612b15629d50892fe2b8d38dcff73928c47ad00cc816b2a65434d0baa0160fff74ef812
-
Filesize
6.0MB
MD5345d093d3d88c1f359e07e9ab8d318fc
SHA1d7218bf96161d14219e5ef5c7bceb6d0d4fbc053
SHA256f71a07291bacd2b1d811b69553f17c7c4bae843db9d751ae3fe630b173c6bb01
SHA51296b5411262a5036499e788863ba7a9cde0bf961916506daf16407b6de4c489caa1d8d93331760786d17d795786f9d091f90849cc7a6740f5e52f4acff5e3f3e3