Analysis
-
max time kernel
183s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe
Resource
win10v2004-20220812-en
General
-
Target
d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe
-
Size
489KB
-
MD5
546554152709f074e953574b2f8fc230
-
SHA1
b694e2efbf05dcb8ebe4cf184f1553732522026f
-
SHA256
d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1
-
SHA512
cf45eabec73079377704b0c72ceb2835edc247acfa35bc4f0bfae0d6ca1e4833cb2c90bcabea2ad0e05f59cb84a6e94b4024feab707fc0f2ee9e8c004d3556f4
-
SSDEEP
12288:VG9Or/XvReObFLnbJjUYP83kkS4Adhlp3H5jAcm:VC6XvR1bFLnbJ9P83kkS4Slt5jNm
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\oMYYkgIo\\RmwYUAMQ.exe," d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\oMYYkgIo\\RmwYUAMQ.exe," d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2248 qywcIccg.exe 4692 RmwYUAMQ.exe 2020 UUgMEQow.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation qywcIccg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qywcIccg.exe = "C:\\Users\\Admin\\rmAIwYsw\\qywcIccg.exe" d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RmwYUAMQ.exe = "C:\\ProgramData\\oMYYkgIo\\RmwYUAMQ.exe" d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qywcIccg.exe = "C:\\Users\\Admin\\rmAIwYsw\\qywcIccg.exe" qywcIccg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RmwYUAMQ.exe = "C:\\ProgramData\\oMYYkgIo\\RmwYUAMQ.exe" RmwYUAMQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RmwYUAMQ.exe = "C:\\ProgramData\\oMYYkgIo\\RmwYUAMQ.exe" UUgMEQow.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\rmAIwYsw UUgMEQow.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\rmAIwYsw\qywcIccg UUgMEQow.exe File created C:\Windows\SysWOW64\shell32.dll.exe qywcIccg.exe File opened for modification C:\Windows\SysWOW64\sheLockSelect.wma qywcIccg.exe File opened for modification C:\Windows\SysWOW64\sheSyncInitialize.docx qywcIccg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 5768 reg.exe 5668 reg.exe 1952 reg.exe 3592 reg.exe 4608 reg.exe 5444 reg.exe 5580 reg.exe 3656 reg.exe 6016 reg.exe 4012 reg.exe 2392 reg.exe 5036 reg.exe 744 reg.exe 4336 reg.exe 952 reg.exe 3840 reg.exe 1452 reg.exe 4556 reg.exe 3404 reg.exe 4852 reg.exe 4504 reg.exe 5884 reg.exe 2204 reg.exe 4792 reg.exe 3856 reg.exe 4320 reg.exe 5888 reg.exe 5344 reg.exe 5456 reg.exe 2224 reg.exe 3928 reg.exe 2676 reg.exe 5888 reg.exe 4932 reg.exe 3648 reg.exe 5960 reg.exe 3112 reg.exe 1644 reg.exe 4908 reg.exe 4292 reg.exe 1816 reg.exe 3612 reg.exe 2148 reg.exe 2832 reg.exe 5028 reg.exe 1632 reg.exe 5856 reg.exe 3212 reg.exe 4264 reg.exe 5804 reg.exe 5816 reg.exe 3856 reg.exe 3748 reg.exe 3244 reg.exe 1296 reg.exe 4584 reg.exe 2572 reg.exe 4184 reg.exe 4124 reg.exe 4448 reg.exe 2028 reg.exe 2100 reg.exe 4228 reg.exe 5372 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2024 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2024 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2024 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2024 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2504 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2504 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2504 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2504 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 3748 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 3748 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 3748 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 3748 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2620 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2620 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2620 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2620 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2348 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2348 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2348 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2348 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 3080 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 3080 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 3080 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 3080 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 1952 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 1952 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 1952 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 1952 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2100 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2100 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2100 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2100 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4136 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4136 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4136 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4136 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2340 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2340 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2340 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 2340 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 1344 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 1344 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 1344 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 1344 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4992 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4992 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4992 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4992 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4936 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4936 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4936 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 4936 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe 2248 qywcIccg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 2248 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 80 PID 4888 wrote to memory of 2248 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 80 PID 4888 wrote to memory of 2248 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 80 PID 4888 wrote to memory of 4692 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 81 PID 4888 wrote to memory of 4692 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 81 PID 4888 wrote to memory of 4692 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 81 PID 4888 wrote to memory of 4820 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 83 PID 4888 wrote to memory of 4820 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 83 PID 4888 wrote to memory of 4820 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 83 PID 4820 wrote to memory of 3884 4820 cmd.exe 85 PID 4820 wrote to memory of 3884 4820 cmd.exe 85 PID 4820 wrote to memory of 3884 4820 cmd.exe 85 PID 3884 wrote to memory of 208 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 86 PID 3884 wrote to memory of 208 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 86 PID 3884 wrote to memory of 208 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 86 PID 4888 wrote to memory of 228 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 88 PID 4888 wrote to memory of 228 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 88 PID 4888 wrote to memory of 228 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 88 PID 4888 wrote to memory of 2204 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 90 PID 4888 wrote to memory of 2204 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 90 PID 4888 wrote to memory of 2204 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 90 PID 4888 wrote to memory of 1972 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 92 PID 4888 wrote to memory of 1972 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 92 PID 4888 wrote to memory of 1972 4888 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 92 PID 3884 wrote to memory of 380 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 93 PID 3884 wrote to memory of 380 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 93 PID 3884 wrote to memory of 380 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 93 PID 3884 wrote to memory of 3988 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 94 PID 3884 wrote to memory of 3988 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 94 PID 3884 wrote to memory of 3988 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 94 PID 3884 wrote to memory of 5096 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 98 PID 3884 wrote to memory of 5096 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 98 PID 3884 wrote to memory of 5096 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 98 PID 208 wrote to memory of 1248 208 cmd.exe 100 PID 208 wrote to memory of 1248 208 cmd.exe 100 PID 208 wrote to memory of 1248 208 cmd.exe 100 PID 3884 wrote to memory of 1964 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 101 PID 3884 wrote to memory of 1964 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 101 PID 3884 wrote to memory of 1964 3884 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 101 PID 1248 wrote to memory of 3240 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 103 PID 1248 wrote to memory of 3240 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 103 PID 1248 wrote to memory of 3240 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 103 PID 1248 wrote to memory of 716 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 105 PID 1248 wrote to memory of 716 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 105 PID 1248 wrote to memory of 716 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 105 PID 1248 wrote to memory of 744 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 107 PID 1248 wrote to memory of 744 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 107 PID 1248 wrote to memory of 744 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 107 PID 1248 wrote to memory of 3256 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 109 PID 1248 wrote to memory of 3256 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 109 PID 1248 wrote to memory of 3256 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 109 PID 1248 wrote to memory of 4844 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 111 PID 1248 wrote to memory of 4844 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 111 PID 1248 wrote to memory of 4844 1248 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 111 PID 3240 wrote to memory of 2024 3240 cmd.exe 113 PID 3240 wrote to memory of 2024 3240 cmd.exe 113 PID 3240 wrote to memory of 2024 3240 cmd.exe 113 PID 4844 wrote to memory of 844 4844 cmd.exe 115 PID 4844 wrote to memory of 844 4844 cmd.exe 115 PID 4844 wrote to memory of 844 4844 cmd.exe 115 PID 1964 wrote to memory of 764 1964 cmd.exe 114 PID 1964 wrote to memory of 764 1964 cmd.exe 114 PID 1964 wrote to memory of 764 1964 cmd.exe 114 PID 2024 wrote to memory of 1840 2024 d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe"C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\rmAIwYsw\qywcIccg.exe"C:\Users\Admin\rmAIwYsw\qywcIccg.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:2248
-
-
C:\ProgramData\oMYYkgIo\RmwYUAMQ.exe"C:\ProgramData\oMYYkgIo\RmwYUAMQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"2⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"4⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d15⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"6⤵
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d17⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"8⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"10⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d111⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"12⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d113⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"14⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d115⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"16⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d117⤵
- Suspicious behavior: EnumeratesProcesses
PID:3080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"18⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d119⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"20⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d121⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"22⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d123⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"24⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d125⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"26⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d127⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"28⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d129⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"30⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d131⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"32⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d133⤵PID:4704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"34⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d135⤵PID:3016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"36⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d137⤵PID:2584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"38⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d139⤵PID:4840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"40⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d141⤵PID:3424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"42⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d143⤵PID:3196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"44⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d145⤵PID:204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"46⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d147⤵PID:4468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"48⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d149⤵PID:3588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"50⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d151⤵PID:4180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"52⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d153⤵PID:4896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"54⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d155⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"56⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d157⤵PID:5144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"58⤵PID:5160
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d159⤵PID:5344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"60⤵PID:5456
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d161⤵PID:5688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"62⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d163⤵PID:5924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"64⤵PID:6012
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d165⤵PID:2228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"66⤵PID:5144
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d167⤵PID:5492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"68⤵PID:5552
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d169⤵PID:5864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"70⤵PID:5960
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d171⤵PID:5716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"72⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d173⤵PID:4132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"74⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d175⤵PID:5968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"76⤵PID:5372
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d177⤵PID:5880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"78⤵PID:5756
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d179⤵PID:5208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"80⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d181⤵PID:3200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"82⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d183⤵PID:5544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"84⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d185⤵PID:4860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"86⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d187⤵PID:780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"88⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d189⤵PID:5584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"90⤵PID:5628
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d191⤵PID:4700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"92⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d193⤵PID:2452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"94⤵PID:5452
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d195⤵PID:1452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"96⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d197⤵PID:3844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"98⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d199⤵PID:5276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"100⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1101⤵PID:4584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"102⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1103⤵PID:4512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"104⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1105⤵PID:5272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"106⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1107⤵PID:64
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"108⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1109⤵PID:1900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"110⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1111⤵PID:5784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"112⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1113⤵PID:5480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"114⤵PID:5872
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1115⤵PID:5616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"116⤵PID:6076
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1117⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"118⤵PID:5828
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1119⤵PID:4436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"120⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1.exeC:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1121⤵PID:4840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d243a342c76ea5b9d9c37671f1ea3260d637a553945037781f71d9973cecc0d1"122⤵PID:5320
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-