Analysis
-
max time kernel
167s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 19:41
Static task
static1
Behavioral task
behavioral1
Sample
240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe
Resource
win10v2004-20220812-en
General
-
Target
240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe
-
Size
634KB
-
MD5
4e476f99ee7e271e734179b3683afcb0
-
SHA1
1a0e3b22b8466ca2475287558b94c5c6ec59d85c
-
SHA256
240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981
-
SHA512
ecf5cd557727768b3536f4a28c787746733b0167d0816d544606150b8027e3ed1457fae6e3578163ccb0e115dcf202b92093f2e3374ff7002cc7aa064614395c
-
SSDEEP
12288:yrV7j7aEcAhsiTE257jusUNIj7b1ATP30t3L88cnQ7bbbbbbbbbbbbbbbbbbbbbp:0V7f4Am32VusUNIj7GT/IL88cnObbbbl
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\DQQEUgEU\\wssUMEQA.exe," 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\DQQEUgEU\\wssUMEQA.exe," 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 61 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 836 POwsIMwA.exe 3524 wssUMEQA.exe 3108 IIUEAMMw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation wssUMEQA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wssUMEQA.exe = "C:\\ProgramData\\DQQEUgEU\\wssUMEQA.exe" wssUMEQA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wssUMEQA.exe = "C:\\ProgramData\\DQQEUgEU\\wssUMEQA.exe" IIUEAMMw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\POwsIMwA.exe = "C:\\Users\\Admin\\RKYIIMIU\\POwsIMwA.exe" 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\POwsIMwA.exe = "C:\\Users\\Admin\\RKYIIMIU\\POwsIMwA.exe" POwsIMwA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wssUMEQA.exe = "C:\\ProgramData\\DQQEUgEU\\wssUMEQA.exe" 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\RKYIIMIU\POwsIMwA IIUEAMMw.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{286F18D5-D3F5-4260-9489-D0005ABCC1CC}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{AA7697B2-C03F-47E3-8949-2EFA80520A22}.catalogItem svchost.exe File created C:\Windows\SysWOW64\shell32.dll.exe wssUMEQA.exe File opened for modification C:\Windows\SysWOW64\sheOutTest.zip wssUMEQA.exe File opened for modification C:\Windows\SysWOW64\sheRedoDeny.jpg wssUMEQA.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\RKYIIMIU IIUEAMMw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 608 reg.exe 5932 reg.exe 6732 reg.exe 5592 reg.exe 5528 reg.exe 5036 reg.exe 6236 reg.exe 5248 reg.exe 3852 reg.exe 4508 reg.exe 5512 reg.exe 5296 reg.exe 2028 reg.exe 5060 reg.exe 3436 reg.exe 2256 reg.exe 5044 reg.exe 1276 reg.exe 1960 reg.exe 1076 reg.exe 5568 reg.exe 5556 reg.exe 1484 reg.exe 4968 reg.exe 3496 reg.exe 1268 reg.exe 5316 reg.exe 5308 reg.exe 64 reg.exe 3200 reg.exe 5340 reg.exe 5040 reg.exe 2640 reg.exe 2300 reg.exe 4044 reg.exe 1720 reg.exe 5624 reg.exe 5376 reg.exe 1496 reg.exe 6800 reg.exe 6492 reg.exe 4512 reg.exe 5300 reg.exe 1344 reg.exe 5824 reg.exe 6636 reg.exe 4600 reg.exe 6024 reg.exe 6844 reg.exe 3720 reg.exe 3592 reg.exe 796 reg.exe 1868 reg.exe 4508 reg.exe 4776 reg.exe 4908 reg.exe 616 reg.exe 4884 reg.exe 3196 reg.exe 3572 reg.exe 2416 reg.exe 5012 reg.exe 5544 reg.exe 6108 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 1616 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 1616 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 1616 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 1616 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 3104 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 3104 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 3104 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 3104 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 5060 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 5060 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 5060 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 5060 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4340 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4340 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4340 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4340 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 1880 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 1880 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 1880 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 1880 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4768 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4768 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4768 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4768 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 3564 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 3564 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 3564 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 3564 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 528 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 528 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 528 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 528 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 2436 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 2436 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 2436 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 2436 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 2388 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 2388 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 2388 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 2388 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 3320 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 3320 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 3320 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 3320 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4944 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4944 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4944 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4944 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4292 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4292 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4292 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 4292 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe 3524 wssUMEQA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 836 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 77 PID 4952 wrote to memory of 836 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 77 PID 4952 wrote to memory of 836 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 77 PID 4952 wrote to memory of 3524 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 78 PID 4952 wrote to memory of 3524 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 78 PID 4952 wrote to memory of 3524 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 78 PID 4952 wrote to memory of 4936 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 80 PID 4952 wrote to memory of 4936 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 80 PID 4952 wrote to memory of 4936 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 80 PID 4952 wrote to memory of 3128 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 82 PID 4952 wrote to memory of 3128 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 82 PID 4952 wrote to memory of 3128 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 82 PID 4952 wrote to memory of 5040 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 84 PID 4952 wrote to memory of 5040 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 84 PID 4952 wrote to memory of 5040 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 84 PID 4952 wrote to memory of 3592 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 87 PID 4952 wrote to memory of 3592 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 87 PID 4952 wrote to memory of 3592 4952 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 87 PID 4936 wrote to memory of 5068 4936 cmd.exe 86 PID 4936 wrote to memory of 5068 4936 cmd.exe 86 PID 4936 wrote to memory of 5068 4936 cmd.exe 86 PID 5068 wrote to memory of 1508 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 89 PID 5068 wrote to memory of 1508 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 89 PID 5068 wrote to memory of 1508 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 89 PID 5068 wrote to memory of 4224 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 91 PID 5068 wrote to memory of 4224 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 91 PID 5068 wrote to memory of 4224 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 91 PID 5068 wrote to memory of 5052 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 92 PID 5068 wrote to memory of 5052 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 92 PID 5068 wrote to memory of 5052 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 92 PID 1508 wrote to memory of 4284 1508 cmd.exe 94 PID 1508 wrote to memory of 4284 1508 cmd.exe 94 PID 1508 wrote to memory of 4284 1508 cmd.exe 94 PID 5068 wrote to memory of 4968 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 93 PID 5068 wrote to memory of 4968 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 93 PID 5068 wrote to memory of 4968 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 93 PID 5068 wrote to memory of 4948 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 95 PID 5068 wrote to memory of 4948 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 95 PID 5068 wrote to memory of 4948 5068 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 95 PID 4284 wrote to memory of 688 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 100 PID 4284 wrote to memory of 688 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 100 PID 4284 wrote to memory of 688 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 100 PID 4284 wrote to memory of 796 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 102 PID 4284 wrote to memory of 796 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 102 PID 4284 wrote to memory of 796 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 102 PID 4284 wrote to memory of 2256 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 104 PID 4284 wrote to memory of 2256 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 104 PID 4284 wrote to memory of 2256 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 104 PID 4284 wrote to memory of 2640 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 105 PID 4284 wrote to memory of 2640 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 105 PID 4284 wrote to memory of 2640 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 105 PID 4284 wrote to memory of 4540 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 107 PID 4284 wrote to memory of 4540 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 107 PID 4284 wrote to memory of 4540 4284 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 107 PID 688 wrote to memory of 1616 688 cmd.exe 110 PID 688 wrote to memory of 1616 688 cmd.exe 110 PID 688 wrote to memory of 1616 688 cmd.exe 110 PID 1616 wrote to memory of 4188 1616 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 111 PID 1616 wrote to memory of 4188 1616 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 111 PID 1616 wrote to memory of 4188 1616 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 111 PID 1616 wrote to memory of 2004 1616 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 113 PID 1616 wrote to memory of 2004 1616 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 113 PID 1616 wrote to memory of 2004 1616 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 113 PID 1616 wrote to memory of 3572 1616 240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe"C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\RKYIIMIU\POwsIMwA.exe"C:\Users\Admin\RKYIIMIU\POwsIMwA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:836
-
-
C:\ProgramData\DQQEUgEU\wssUMEQA.exe"C:\ProgramData\DQQEUgEU\wssUMEQA.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:3524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"2⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c9813⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"4⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c9815⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"6⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c9817⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"8⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c9819⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"10⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98111⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"12⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98113⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"14⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98115⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"16⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98117⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"18⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98119⤵
- Suspicious behavior: EnumeratesProcesses
PID:3564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"20⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98121⤵
- Suspicious behavior: EnumeratesProcesses
PID:528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"22⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98123⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"24⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98125⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"26⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98127⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"28⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98129⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"30⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98131⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"32⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98133⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"34⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98135⤵PID:3196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"36⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98137⤵PID:396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"38⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98139⤵PID:1788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"40⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98141⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"42⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98143⤵PID:4052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"44⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98145⤵PID:3176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"46⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98147⤵PID:3852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"48⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98149⤵PID:3376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"50⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98151⤵PID:3752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"52⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98153⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"54⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98155⤵PID:3376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"56⤵PID:5268
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98157⤵PID:5316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"58⤵PID:5484
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98159⤵PID:5756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"60⤵PID:5896
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98161⤵PID:6112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"62⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98163⤵PID:940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"64⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98165⤵PID:5532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"66⤵PID:5684
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98167⤵PID:5924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"68⤵PID:6052
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98169⤵PID:5128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"70⤵PID:5476
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98171⤵PID:6124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"72⤵PID:5916
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98173⤵PID:6096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"74⤵PID:6004
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98175⤵PID:5340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"76⤵PID:5368
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98177⤵PID:2024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"78⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98179⤵PID:5936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"80⤵PID:5968
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98181⤵PID:5628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"82⤵PID:6112
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98183⤵PID:6620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"84⤵PID:6640
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98185⤵PID:6888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"86⤵PID:6936
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98187⤵PID:7156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"88⤵PID:5628
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98189⤵PID:5260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"90⤵PID:6168
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98191⤵PID:4940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"92⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98193⤵PID:6120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"94⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98195⤵PID:5992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"96⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98197⤵PID:4300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"98⤵PID:6612
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c98199⤵PID:2404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"100⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981101⤵PID:5156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"102⤵PID:6720
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981103⤵PID:4256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"104⤵PID:5952
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981105⤵PID:5348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"106⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981107⤵PID:2416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"108⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981109⤵PID:3944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"110⤵PID:6920
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981111⤵PID:6664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"112⤵PID:7004
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981113⤵PID:6348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"114⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981115⤵PID:6252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"116⤵PID:6160
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981117⤵PID:5776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"118⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981119⤵PID:6244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"120⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981.exeC:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981121⤵PID:4308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\240751d8c98257456ef6583c41d96e88c5c66ef699d35ab93f346ee889a6c981"122⤵PID:6632
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-