Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
11s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe
Resource
win7-20221111-en
8 signatures
150 seconds
General
-
Target
a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe
-
Size
16KB
-
MD5
7d2c9dcea4b12ddb26d943aef5956fc7
-
SHA1
6811f78b05d0b1d050bc211f48c06ba349b74ed5
-
SHA256
a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d
-
SHA512
f792fc2b58a825f6518e3434a91c93afc3ba9c1a3fd81e97a75b60c7b4df2fe8bfdfad322fd9827e43f67a962587fd122742958f123caa5a9ec9342ed360280c
-
SSDEEP
384:IZ76Fph0u+c1POTB7wqc1E3egvonG5LChm04LGrLmZ:VP+cgB2EvsG8mJ2Lu
Malware Config
Signatures
-
Executes dropped EXE 31 IoCs
pid Process 3452 siwdaapi.exe 1528 siwdaapi.exe 4100 siwdaapi.exe 5036 siwdaapi.exe 2160 siwdaapi.exe 2016 siwdaapi.exe 1264 siwdaapi.exe 3076 siwdaapi.exe 208 siwdaapi.exe 4812 siwdaapi.exe 3644 siwdaapi.exe 4980 siwdaapi.exe 3976 siwdaapi.exe 4560 siwdaapi.exe 3516 siwdaapi.exe 4000 siwdaapi.exe 5084 siwdaapi.exe 2776 Conhost.exe 3144 siwdaapi.exe 1552 siwdaapi.exe 2916 siwdaapi.exe 1568 siwdaapi.exe 1440 siwdaapi.exe 3944 siwdaapi.exe 1492 siwdaapi.exe 2128 siwdaapi.exe 824 siwdaapi.exe 1708 cmd.exe 4248 siwdaapi.exe 4680 siwdaapi.exe 4568 siwdaapi.exe -
Installs/modifies Browser Helper Object 2 TTPs 62 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} Conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154}\ = "mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45694105-5108-9405-3695-954187462154} siwdaapi.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mpwddapi.dll siwdaapi.exe File created C:\Windows\SysWOW64\mpwddapi.dll siwdaapi.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe cmd.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\mpwddapi.dll siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File opened for modification C:\Windows\SysWOW64\mpwddapi.dll siwdaapi.exe File created C:\Windows\SysWOW64\mpwddapi.dll siwdaapi.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe File created C:\Windows\SysWOW64\siwdaapi.exe a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe File created C:\Windows\SysWOW64\mpwddapi.dll siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe Conhost.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys Conhost.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File opened for modification C:\Windows\SysWOW64\mpwddapi.dll a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\mpwddapi.dll siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe cmd.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe siwdaapi.exe File created C:\Windows\SysWOW64\mpwddapi.dll siwdaapi.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe siwdaapi.exe File created C:\Windows\SysWOW64\mpwddapi.dll siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File opened for modification C:\Windows\SysWOW64\mpwddapi.dll siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\mpwddapi.dll siwdaapi.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File created C:\Windows\SysWOW64\mpwddapi.dll siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\spwdbapi.sys siwdaapi.exe File opened for modification C:\Windows\SysWOW64\mpwddapi.dll siwdaapi.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\siwdaapi.exe a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe siwdaapi.exe File opened for modification C:\Windows\SysWOW64\mpwddapi.dll siwdaapi.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" Conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ThreadingModel = "Apartment" siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 Conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32 siwdaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45694105-5108-9405-3695-954187462154}\InprocServer32\ = "C:\\Windows\\SysWow64\\mpwddapi.dll" cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4992 a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe 4992 a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe 3452 siwdaapi.exe 3452 siwdaapi.exe 1528 siwdaapi.exe 1528 siwdaapi.exe 4100 siwdaapi.exe 4100 siwdaapi.exe 5036 siwdaapi.exe 5036 siwdaapi.exe 2160 siwdaapi.exe 2160 siwdaapi.exe 2016 siwdaapi.exe 2016 siwdaapi.exe 1264 siwdaapi.exe 1264 siwdaapi.exe 3076 siwdaapi.exe 3076 siwdaapi.exe 208 siwdaapi.exe 208 siwdaapi.exe 4812 siwdaapi.exe 4812 siwdaapi.exe 3644 siwdaapi.exe 3644 siwdaapi.exe 4980 siwdaapi.exe 4980 siwdaapi.exe 3976 siwdaapi.exe 3976 siwdaapi.exe 4560 siwdaapi.exe 4560 siwdaapi.exe 3516 siwdaapi.exe 3516 siwdaapi.exe 4000 siwdaapi.exe 4000 siwdaapi.exe 5084 siwdaapi.exe 5084 siwdaapi.exe 2776 Conhost.exe 2776 Conhost.exe 3144 siwdaapi.exe 3144 siwdaapi.exe 1552 siwdaapi.exe 1552 siwdaapi.exe 2916 siwdaapi.exe 2916 siwdaapi.exe 1568 siwdaapi.exe 1568 siwdaapi.exe 1440 siwdaapi.exe 1440 siwdaapi.exe 3944 siwdaapi.exe 3944 siwdaapi.exe 1492 siwdaapi.exe 1492 siwdaapi.exe 2128 siwdaapi.exe 2128 siwdaapi.exe 824 siwdaapi.exe 824 siwdaapi.exe 1708 cmd.exe 1708 cmd.exe 4248 siwdaapi.exe 4248 siwdaapi.exe 4680 siwdaapi.exe 4680 siwdaapi.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 4992 a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe Token: SeDebugPrivilege 3452 siwdaapi.exe Token: SeDebugPrivilege 1528 siwdaapi.exe Token: SeDebugPrivilege 4100 siwdaapi.exe Token: SeDebugPrivilege 5036 siwdaapi.exe Token: SeDebugPrivilege 2160 siwdaapi.exe Token: SeDebugPrivilege 2016 siwdaapi.exe Token: SeDebugPrivilege 1264 siwdaapi.exe Token: SeDebugPrivilege 3076 siwdaapi.exe Token: SeDebugPrivilege 208 siwdaapi.exe Token: SeDebugPrivilege 4812 siwdaapi.exe Token: SeDebugPrivilege 3644 siwdaapi.exe Token: SeDebugPrivilege 4980 siwdaapi.exe Token: SeDebugPrivilege 3976 siwdaapi.exe Token: SeDebugPrivilege 4560 siwdaapi.exe Token: SeDebugPrivilege 3516 siwdaapi.exe Token: SeDebugPrivilege 4000 siwdaapi.exe Token: SeDebugPrivilege 5084 siwdaapi.exe Token: SeDebugPrivilege 2776 Conhost.exe Token: SeDebugPrivilege 3144 siwdaapi.exe Token: SeDebugPrivilege 1552 siwdaapi.exe Token: SeDebugPrivilege 2916 siwdaapi.exe Token: SeDebugPrivilege 1568 siwdaapi.exe Token: SeDebugPrivilege 1440 siwdaapi.exe Token: SeDebugPrivilege 3944 siwdaapi.exe Token: SeDebugPrivilege 1492 siwdaapi.exe Token: SeDebugPrivilege 2128 siwdaapi.exe Token: SeDebugPrivilege 824 siwdaapi.exe Token: SeDebugPrivilege 1708 cmd.exe Token: SeDebugPrivilege 4248 siwdaapi.exe Token: SeDebugPrivilege 4680 siwdaapi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4992 wrote to memory of 1044 4992 a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe 80 PID 4992 wrote to memory of 1044 4992 a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe 80 PID 4992 wrote to memory of 1044 4992 a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe 80 PID 4992 wrote to memory of 3452 4992 a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe 82 PID 4992 wrote to memory of 3452 4992 a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe 82 PID 4992 wrote to memory of 3452 4992 a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe 82 PID 3452 wrote to memory of 3416 3452 siwdaapi.exe 83 PID 3452 wrote to memory of 3416 3452 siwdaapi.exe 83 PID 3452 wrote to memory of 3416 3452 siwdaapi.exe 83 PID 3452 wrote to memory of 1528 3452 siwdaapi.exe 85 PID 3452 wrote to memory of 1528 3452 siwdaapi.exe 85 PID 3452 wrote to memory of 1528 3452 siwdaapi.exe 85 PID 1528 wrote to memory of 1004 1528 siwdaapi.exe 86 PID 1528 wrote to memory of 1004 1528 siwdaapi.exe 86 PID 1528 wrote to memory of 1004 1528 siwdaapi.exe 86 PID 1528 wrote to memory of 4100 1528 siwdaapi.exe 88 PID 1528 wrote to memory of 4100 1528 siwdaapi.exe 88 PID 1528 wrote to memory of 4100 1528 siwdaapi.exe 88 PID 4100 wrote to memory of 5088 4100 siwdaapi.exe 89 PID 4100 wrote to memory of 5088 4100 siwdaapi.exe 89 PID 4100 wrote to memory of 5088 4100 siwdaapi.exe 89 PID 4100 wrote to memory of 5036 4100 siwdaapi.exe 91 PID 4100 wrote to memory of 5036 4100 siwdaapi.exe 91 PID 4100 wrote to memory of 5036 4100 siwdaapi.exe 91 PID 5036 wrote to memory of 4988 5036 siwdaapi.exe 92 PID 5036 wrote to memory of 4988 5036 siwdaapi.exe 92 PID 5036 wrote to memory of 4988 5036 siwdaapi.exe 92 PID 5036 wrote to memory of 2160 5036 siwdaapi.exe 94 PID 5036 wrote to memory of 2160 5036 siwdaapi.exe 94 PID 5036 wrote to memory of 2160 5036 siwdaapi.exe 94 PID 2160 wrote to memory of 5032 2160 siwdaapi.exe 95 PID 2160 wrote to memory of 5032 2160 siwdaapi.exe 95 PID 2160 wrote to memory of 5032 2160 siwdaapi.exe 95 PID 2160 wrote to memory of 2016 2160 siwdaapi.exe 97 PID 2160 wrote to memory of 2016 2160 siwdaapi.exe 97 PID 2160 wrote to memory of 2016 2160 siwdaapi.exe 97 PID 2016 wrote to memory of 2148 2016 siwdaapi.exe 98 PID 2016 wrote to memory of 2148 2016 siwdaapi.exe 98 PID 2016 wrote to memory of 2148 2016 siwdaapi.exe 98 PID 2016 wrote to memory of 1264 2016 siwdaapi.exe 100 PID 2016 wrote to memory of 1264 2016 siwdaapi.exe 100 PID 2016 wrote to memory of 1264 2016 siwdaapi.exe 100 PID 1264 wrote to memory of 2092 1264 siwdaapi.exe 101 PID 1264 wrote to memory of 2092 1264 siwdaapi.exe 101 PID 1264 wrote to memory of 2092 1264 siwdaapi.exe 101 PID 1264 wrote to memory of 3076 1264 siwdaapi.exe 103 PID 1264 wrote to memory of 3076 1264 siwdaapi.exe 103 PID 1264 wrote to memory of 3076 1264 siwdaapi.exe 103 PID 3076 wrote to memory of 4524 3076 siwdaapi.exe 104 PID 3076 wrote to memory of 4524 3076 siwdaapi.exe 104 PID 3076 wrote to memory of 4524 3076 siwdaapi.exe 104 PID 3076 wrote to memory of 208 3076 siwdaapi.exe 106 PID 3076 wrote to memory of 208 3076 siwdaapi.exe 106 PID 3076 wrote to memory of 208 3076 siwdaapi.exe 106 PID 208 wrote to memory of 340 208 siwdaapi.exe 107 PID 208 wrote to memory of 340 208 siwdaapi.exe 107 PID 208 wrote to memory of 340 208 siwdaapi.exe 107 PID 208 wrote to memory of 4812 208 siwdaapi.exe 109 PID 208 wrote to memory of 4812 208 siwdaapi.exe 109 PID 208 wrote to memory of 4812 208 siwdaapi.exe 109 PID 4812 wrote to memory of 1596 4812 siwdaapi.exe 110 PID 4812 wrote to memory of 1596 4812 siwdaapi.exe 110 PID 4812 wrote to memory of 1596 4812 siwdaapi.exe 110 PID 4812 wrote to memory of 3644 4812 siwdaapi.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe"C:\Users\Admin\AppData\Local\Temp\a64c731e014d98f50b1ac26aac87dd729869c7d1c79e956b0c9e32075439990d.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240551609.bat2⤵PID:1044
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe2⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240552062.bat3⤵PID:3416
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe3⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240552750.bat4⤵PID:1004
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe4⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240552953.bat5⤵PID:5088
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe5⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240553187.bat6⤵PID:4988
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe6⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240553343.bat7⤵PID:5032
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe7⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240553484.bat8⤵PID:2148
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe8⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240553640.bat9⤵PID:2092
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe9⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240553812.bat10⤵PID:4524
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe10⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240554062.bat11⤵PID:340
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe11⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240554218.bat12⤵PID:1596
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe12⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240554500.bat13⤵PID:4068
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe13⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240556781.bat14⤵PID:4472
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe14⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240556906.bat15⤵PID:1864
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe15⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240557140.bat16⤵PID:4896
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe16⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240557359.bat17⤵PID:2032
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe17⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240557656.bat18⤵PID:2436
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe18⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240557875.bat19⤵PID:4596
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe19⤵PID:2776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240558031.bat20⤵PID:4112
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe20⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240558218.bat21⤵PID:440
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe21⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240558375.bat22⤵PID:1112
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe22⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240558546.bat23⤵PID:4220
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe23⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240558703.bat24⤵PID:3256
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe24⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240558937.bat25⤵PID:3420
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe25⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240559109.bat26⤵PID:2888
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe26⤵PID:1492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240559265.bat27⤵PID:1436
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe27⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240559515.bat28⤵PID:2500
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe28⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240559687.bat29⤵PID:5068
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe29⤵PID:1708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240559968.bat30⤵PID:1660
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe30⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240560156.bat31⤵PID:4040
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe31⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240560406.bat32⤵PID:2340
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe32⤵
- Executes dropped EXE
PID:4568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240560578.bat33⤵PID:1232
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe33⤵PID:3712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240561703.bat34⤵PID:1048
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe34⤵PID:1520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240561859.bat35⤵PID:1516
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe35⤵PID:4024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240562031.bat36⤵PID:2112
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe36⤵PID:1484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240562171.bat37⤵PID:1224
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe37⤵PID:5176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240579312.bat38⤵PID:5188
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe38⤵PID:5232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240579468.bat39⤵PID:5248
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe39⤵PID:5284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240579640.bat40⤵PID:5304
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe40⤵PID:5356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240579812.bat41⤵PID:5372
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe41⤵PID:5408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240579984.bat42⤵PID:5436
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe42⤵PID:5508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240580218.bat43⤵PID:5520
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe43⤵PID:5564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240580390.bat44⤵PID:5584
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe44⤵PID:5652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240580625.bat45⤵PID:5664
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe45⤵PID:5716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240580859.bat46⤵PID:5736
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe46⤵PID:5776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240581031.bat47⤵PID:5796
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe47⤵PID:5836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240581218.bat48⤵PID:5848
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe48⤵PID:5896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240581359.bat49⤵PID:5916
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe49⤵PID:5956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240581546.bat50⤵PID:5980
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe50⤵PID:6024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240581703.bat51⤵PID:6040
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe51⤵PID:6092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240581890.bat52⤵PID:6104
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe52⤵PID:868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240582015.bat53⤵PID:5264
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe53⤵PID:5600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240582171.bat54⤵PID:5872
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe54⤵PID:6160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240582343.bat55⤵PID:6176
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe55⤵PID:6220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240582515.bat56⤵PID:6232
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe56⤵PID:6304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240582671.bat57⤵PID:6320
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe57⤵PID:6396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240582875.bat58⤵PID:6412
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe58⤵PID:6464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240583046.bat59⤵PID:6484
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe59⤵PID:6524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240583203.bat60⤵PID:6544
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe60⤵PID:6592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240583359.bat61⤵PID:6660
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe61⤵PID:6760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240583703.bat62⤵PID:6780
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe62⤵PID:6864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240583875.bat63⤵PID:6884
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe63⤵PID:6984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240584031.bat64⤵PID:7008
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe64⤵PID:7084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240585015.bat65⤵PID:4352
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe65⤵PID:6656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240586234.bat66⤵PID:6976
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe66⤵PID:1980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240586437.bat67⤵PID:4028
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe67⤵PID:1264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240586625.bat68⤵PID:3076
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe68⤵PID:204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240586796.bat69⤵PID:7176
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe69⤵PID:7232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240587031.bat70⤵PID:7244
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe70⤵PID:7292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240587156.bat71⤵PID:7304
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe71⤵PID:7372
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe72⤵PID:7536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240587812.bat73⤵PID:7560
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe73⤵PID:7760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240593734.bat74⤵PID:4948
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe74⤵PID:7768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240593968.bat75⤵PID:8032
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe75⤵PID:7904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240594156.bat76⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe76⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240594359.bat77⤵PID:7516
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV178⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe77⤵PID:4708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240594562.bat78⤵PID:8200
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe78⤵PID:8248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240594859.bat79⤵PID:8264
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe79⤵PID:8300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240595000.bat80⤵PID:8336
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe80⤵PID:8384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240599421.bat81⤵PID:8396
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe81⤵PID:8436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240599609.bat82⤵PID:8452
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe82⤵PID:8496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240599765.bat83⤵PID:8508
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe83⤵PID:8548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240599906.bat84⤵PID:8568
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe84⤵PID:8608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240600046.bat85⤵PID:8628
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe85⤵PID:8676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240600187.bat86⤵PID:8692
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe86⤵PID:8736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240600375.bat87⤵PID:8752
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe87⤵PID:8796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240600500.bat88⤵PID:8820
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe88⤵PID:8848
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe89⤵PID:8900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240604000.bat90⤵PID:8928
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe90⤵PID:8968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240604109.bat91⤵PID:8980
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe91⤵PID:9020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240604250.bat92⤵PID:9060
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe92⤵PID:9096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240604546.bat93⤵PID:9108
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe93⤵PID:9156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240604718.bat94⤵PID:9184
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe94⤵PID:8348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240604859.bat95⤵PID:1608
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe95⤵PID:4396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240605078.bat96⤵PID:8996
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe96⤵PID:9248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240605281.bat97⤵PID:9268
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe97⤵PID:9320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240605453.bat98⤵PID:9332
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe98⤵PID:9388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240605703.bat99⤵PID:9408
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe99⤵PID:9440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240605843.bat100⤵PID:9452
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe100⤵PID:9516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240606171.bat101⤵PID:9532
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe101⤵PID:9568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240606328.bat102⤵PID:9732
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe102⤵PID:9904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240612500.bat103⤵PID:10156
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe103⤵PID:5580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613031.bat104⤵PID:5976
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe104⤵PID:9616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613312.bat105⤵PID:5316
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe105⤵PID:6112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613593.bat106⤵PID:3788
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe106⤵PID:5684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613859.bat107⤵PID:6164
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe107⤵PID:1824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240614218.bat108⤵PID:4344
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe108⤵PID:6524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240614562.bat109⤵PID:3444
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe109⤵PID:10348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615171.bat110⤵PID:10368
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe110⤵PID:10400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615390.bat111⤵PID:10424
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe111⤵PID:10472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615671.bat112⤵PID:10488
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe112⤵PID:10532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615968.bat113⤵PID:10544
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe113⤵PID:10588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616218.bat114⤵PID:10612
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe114⤵PID:10668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616453.bat115⤵PID:10684
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe115⤵PID:10760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616687.bat116⤵PID:10780
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe116⤵PID:10872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617015.bat117⤵PID:10916
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe117⤵PID:11040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617296.bat118⤵PID:11056
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe118⤵PID:11120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617468.bat119⤵PID:11156
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe119⤵PID:11232
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe120⤵PID:2160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617906.bat121⤵PID:7088
-
-
C:\Windows\SysWOW64\siwdaapi.exeC:\Windows\system32\siwdaapi.exe121⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618390.bat122⤵PID:10756
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-