Analysis
-
max time kernel
171s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe
Resource
win10v2004-20220812-en
General
-
Target
cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe
-
Size
505KB
-
MD5
74054d786811fe166a43c6a435941800
-
SHA1
f2f4f11459b3a4130946d31f975f9c2f7da88340
-
SHA256
cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d
-
SHA512
ebe33cc0d5bec583f0f079447fc9b69c67e42db4f39c365667ef44ef62a6d6aa8e0a233cb1cd832b672c7e9dbea6fe7d7deee4ee0d980e116e4a49ebda2efec5
-
SSDEEP
6144:tOKbA4IcPiLnUUnNMS8GDGkRVOFQ1DfslZRLygzC6nPNvJRuzsHkm2keYFV7A+HF:tOKbacaLUxHEkSfstLygzXVJrii
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\GWEcEEwQ\\QIMwYkkw.exe," cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\GWEcEEwQ\\QIMwYkkw.exe," cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 4464 juIYMIUY.exe 220 QIMwYkkw.exe 4520 JuoIQgMA.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation juIYMIUY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juIYMIUY.exe = "C:\\Users\\Admin\\RmswIUYw\\juIYMIUY.exe" cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juIYMIUY.exe = "C:\\Users\\Admin\\RmswIUYw\\juIYMIUY.exe" juIYMIUY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QIMwYkkw.exe = "C:\\ProgramData\\GWEcEEwQ\\QIMwYkkw.exe" cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QIMwYkkw.exe = "C:\\ProgramData\\GWEcEEwQ\\QIMwYkkw.exe" QIMwYkkw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QIMwYkkw.exe = "C:\\ProgramData\\GWEcEEwQ\\QIMwYkkw.exe" JuoIQgMA.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\RmswIUYw JuoIQgMA.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\RmswIUYw\juIYMIUY JuoIQgMA.exe File created C:\Windows\SysWOW64\shell32.dll.exe juIYMIUY.exe File opened for modification C:\Windows\SysWOW64\sheRestartRename.rar juIYMIUY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 692 reg.exe 3232 reg.exe 4656 reg.exe 3796 reg.exe 3624 reg.exe 4608 reg.exe 2772 reg.exe 552 reg.exe 4768 reg.exe 1824 reg.exe 3816 reg.exe 4996 reg.exe 4948 reg.exe 2412 reg.exe 1940 reg.exe 4148 reg.exe 3448 reg.exe 3980 reg.exe 3484 reg.exe 2244 reg.exe 1356 reg.exe 4636 reg.exe 4836 reg.exe 1768 reg.exe 4964 reg.exe 3820 reg.exe 1344 reg.exe 2156 reg.exe 3468 reg.exe 4196 reg.exe 4364 reg.exe 5036 reg.exe 4208 reg.exe 2816 reg.exe 1264 reg.exe 772 reg.exe 1744 reg.exe 4832 reg.exe 5060 reg.exe 3848 reg.exe 1016 reg.exe 4164 reg.exe 2124 reg.exe 4200 reg.exe 3088 reg.exe 4232 reg.exe 3500 reg.exe 5104 reg.exe 1768 reg.exe 5076 reg.exe 3524 reg.exe 2172 reg.exe 3672 reg.exe 4732 reg.exe 1140 reg.exe 2780 reg.exe 3464 reg.exe 3128 reg.exe 2260 reg.exe 804 reg.exe 3576 reg.exe 2196 reg.exe 2612 reg.exe 4572 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1516 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1516 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1516 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1516 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1268 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1268 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1268 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1268 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4064 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4064 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4064 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4064 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1952 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1952 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1952 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1952 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1772 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1772 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1772 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1772 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2128 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2128 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2128 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2128 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2460 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2460 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2460 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2460 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2828 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2828 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2828 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 2828 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4812 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4812 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4812 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4812 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4728 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4728 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4728 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4728 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1488 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1488 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1488 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1488 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1424 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1424 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1424 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 1424 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4768 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4768 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4768 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 4768 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe 4464 juIYMIUY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 4464 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 83 PID 1668 wrote to memory of 4464 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 83 PID 1668 wrote to memory of 4464 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 83 PID 1668 wrote to memory of 220 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 84 PID 1668 wrote to memory of 220 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 84 PID 1668 wrote to memory of 220 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 84 PID 1668 wrote to memory of 3844 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 86 PID 1668 wrote to memory of 3844 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 86 PID 1668 wrote to memory of 3844 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 86 PID 1668 wrote to memory of 800 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 88 PID 1668 wrote to memory of 800 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 88 PID 1668 wrote to memory of 800 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 88 PID 1668 wrote to memory of 4308 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 90 PID 1668 wrote to memory of 4308 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 90 PID 1668 wrote to memory of 4308 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 90 PID 1668 wrote to memory of 4656 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 93 PID 1668 wrote to memory of 4656 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 93 PID 1668 wrote to memory of 4656 1668 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 93 PID 3844 wrote to memory of 1320 3844 cmd.exe 92 PID 3844 wrote to memory of 1320 3844 cmd.exe 92 PID 3844 wrote to memory of 1320 3844 cmd.exe 92 PID 1320 wrote to memory of 404 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 95 PID 1320 wrote to memory of 404 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 95 PID 1320 wrote to memory of 404 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 95 PID 404 wrote to memory of 2508 404 cmd.exe 97 PID 404 wrote to memory of 2508 404 cmd.exe 97 PID 404 wrote to memory of 2508 404 cmd.exe 97 PID 1320 wrote to memory of 2212 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 98 PID 1320 wrote to memory of 2212 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 98 PID 1320 wrote to memory of 2212 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 98 PID 1320 wrote to memory of 3848 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 101 PID 1320 wrote to memory of 3848 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 101 PID 1320 wrote to memory of 3848 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 101 PID 1320 wrote to memory of 3324 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 99 PID 1320 wrote to memory of 3324 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 99 PID 1320 wrote to memory of 3324 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 99 PID 1320 wrote to memory of 2576 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 102 PID 1320 wrote to memory of 2576 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 102 PID 1320 wrote to memory of 2576 1320 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 102 PID 2508 wrote to memory of 3172 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 106 PID 2508 wrote to memory of 3172 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 106 PID 2508 wrote to memory of 3172 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 106 PID 2508 wrote to memory of 4732 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 108 PID 2508 wrote to memory of 4732 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 108 PID 2508 wrote to memory of 4732 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 108 PID 2508 wrote to memory of 2344 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 110 PID 2508 wrote to memory of 2344 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 110 PID 2508 wrote to memory of 2344 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 110 PID 2508 wrote to memory of 3448 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 111 PID 2508 wrote to memory of 3448 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 111 PID 2508 wrote to memory of 3448 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 111 PID 2508 wrote to memory of 4992 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 113 PID 2508 wrote to memory of 4992 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 113 PID 2508 wrote to memory of 4992 2508 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 113 PID 2576 wrote to memory of 2156 2576 cmd.exe 116 PID 2576 wrote to memory of 2156 2576 cmd.exe 116 PID 2576 wrote to memory of 2156 2576 cmd.exe 116 PID 3172 wrote to memory of 1516 3172 cmd.exe 117 PID 3172 wrote to memory of 1516 3172 cmd.exe 117 PID 3172 wrote to memory of 1516 3172 cmd.exe 117 PID 4992 wrote to memory of 2632 4992 cmd.exe 118 PID 4992 wrote to memory of 2632 4992 cmd.exe 118 PID 4992 wrote to memory of 2632 4992 cmd.exe 118 PID 1516 wrote to memory of 4648 1516 cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe"C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\RmswIUYw\juIYMIUY.exe"C:\Users\Admin\RmswIUYw\juIYMIUY.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:4464
-
-
C:\ProgramData\GWEcEEwQ\QIMwYkkw.exe"C:\ProgramData\GWEcEEwQ\QIMwYkkw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"2⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"4⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"6⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"8⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"10⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"12⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"14⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"16⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"18⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"20⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"22⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"24⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"26⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"28⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"30⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"32⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d33⤵PID:3732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"34⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d35⤵PID:460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"36⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d37⤵PID:2364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"38⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d39⤵PID:4312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"40⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d41⤵PID:2612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"42⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d43⤵PID:1952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"44⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d45⤵PID:4748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"46⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d47⤵PID:4456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"48⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d49⤵PID:4864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"50⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d51⤵PID:3408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"52⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d53⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"54⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d55⤵PID:3176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"56⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d57⤵PID:4768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"58⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d59⤵PID:1944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"60⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d61⤵PID:1324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"62⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d63⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"64⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d65⤵PID:1640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"66⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d67⤵PID:1060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"68⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d69⤵PID:1244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"70⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d71⤵PID:3368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"72⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d73⤵PID:768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"74⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d75⤵PID:3732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"76⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d77⤵PID:1900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"78⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d79⤵PID:2964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"80⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d81⤵PID:1940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"82⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d83⤵PID:1420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"84⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d85⤵PID:4972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"86⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d87⤵PID:4848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"88⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d89⤵PID:4192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"90⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d91⤵PID:4808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"92⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d93⤵PID:4856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"94⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d95⤵PID:1156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"96⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d97⤵PID:1768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"98⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d99⤵PID:2432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"100⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d101⤵PID:3928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"102⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d103⤵PID:1576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"104⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d105⤵PID:2884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"106⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d107⤵PID:2460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"108⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d109⤵PID:1260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"110⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d111⤵PID:3368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"112⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d113⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"114⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d115⤵PID:3844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"116⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d117⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"118⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d119⤵PID:4364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"120⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d.exeC:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d121⤵PID:2316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cddba006bd37c9e57ade02bee694fa16a84ca4169b59339c5b5b501c627ef29d"122⤵PID:5036
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-