Analysis
-
max time kernel
126s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe
Resource
win10v2004-20220812-en
General
-
Target
b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe
-
Size
72KB
-
MD5
72ab19f661fc9d551504aa6b696592c6
-
SHA1
75110b40ee6a9999a387aa47b2070c389de77cf4
-
SHA256
b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
-
SHA512
6e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
SSDEEP
1536:bHReXoPOJjLXCuw2PKJ97KLVLM3/8b9taLh:bHRsjJqubKuBLZxtaLh
Malware Config
Signatures
-
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symrdserv.exe -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symrdserv.exe -
Executes dropped EXE 64 IoCs
pid Process 2144 symrdserv.exe 3772 symrdserv.exe 4368 symrdserv.exe 260 symrdserv.exe 1388 symrdserv.exe 4920 symrdserv.exe 4424 symrdserv.exe 1272 symrdserv.exe 4744 symrdserv.exe 724 symrdserv.exe 2588 symrdserv.exe 3856 symrdserv.exe 4212 symrdserv.exe 320 symrdserv.exe 4552 symrdserv.exe 3092 symrdserv.exe 4300 symrdserv.exe 1548 symrdserv.exe 4212 symrdserv.exe 4768 symrdserv.exe 5300 symrdserv.exe 5396 symrdserv.exe 5676 symrdserv.exe 5740 symrdserv.exe 6028 symrdserv.exe 6092 symrdserv.exe 5532 symrdserv.exe 5832 symrdserv.exe 5868 symrdserv.exe 6184 symrdserv.exe 6448 symrdserv.exe 6516 symrdserv.exe 6796 symrdserv.exe 6856 symrdserv.exe 7120 symrdserv.exe 5220 symrdserv.exe 6712 symrdserv.exe 6908 symrdserv.exe 7220 symrdserv.exe 7264 symrdserv.exe 7564 symrdserv.exe 7632 symrdserv.exe 8020 symrdserv.exe 8076 symrdserv.exe 7648 symrdserv.exe 7568 symrdserv.exe 7656 symrdserv.exe 8248 symrdserv.exe 8500 symrdserv.exe 8604 symrdserv.exe 8900 symrdserv.exe 8972 symrdserv.exe 8072 symrdserv.exe 8436 symrdserv.exe 9068 symrdserv.exe 8236 symrdserv.exe 9260 symrdserv.exe 9324 symrdserv.exe 9724 symrdserv.exe 9792 symrdserv.exe 10068 symrdserv.exe 10132 symrdserv.exe 1252 symrdserv.exe 9520 symrdserv.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation symrdserv.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Remote Services = "symrdserv.exe" symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run symrdserv.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\symrdserv.exe b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File created C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe File opened for modification C:\Windows\SysWOW64\symrdserv.exe symrdserv.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 4628 set thread context of 4880 4628 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 80 PID 2144 set thread context of 3772 2144 symrdserv.exe 82 PID 4368 set thread context of 260 4368 symrdserv.exe 94 PID 1388 set thread context of 4920 1388 symrdserv.exe 107 PID 4424 set thread context of 1272 4424 symrdserv.exe 118 PID 4744 set thread context of 724 4744 symrdserv.exe 130 PID 2588 set thread context of 3856 2588 symrdserv.exe 142 PID 4212 set thread context of 320 4212 symrdserv.exe 154 PID 4552 set thread context of 3092 4552 symrdserv.exe 174 PID 4300 set thread context of 1548 4300 symrdserv.exe 178 PID 4212 set thread context of 4768 4212 symrdserv.exe 195 PID 5300 set thread context of 5396 5300 symrdserv.exe 203 PID 5676 set thread context of 5740 5676 symrdserv.exe 214 PID 6028 set thread context of 6092 6028 symrdserv.exe 230 PID 5532 set thread context of 5832 5532 symrdserv.exe 239 PID 5868 set thread context of 6184 5868 symrdserv.exe 250 PID 6448 set thread context of 6516 6448 symrdserv.exe 262 PID 6796 set thread context of 6856 6796 symrdserv.exe 280 PID 7120 set thread context of 5220 7120 symrdserv.exe 287 PID 6712 set thread context of 6908 6712 symrdserv.exe 298 PID 7220 set thread context of 7264 7220 symrdserv.exe 318 PID 7564 set thread context of 7632 7564 symrdserv.exe 324 PID 8020 set thread context of 8076 8020 symrdserv.exe 344 PID 7648 set thread context of 7568 7648 symrdserv.exe 354 PID 7656 set thread context of 8248 7656 symrdserv.exe 362 PID 8500 set thread context of 8604 8500 symrdserv.exe 376 PID 8900 set thread context of 8972 8900 symrdserv.exe 389 PID 8072 set thread context of 8436 8072 symrdserv.exe 403 PID 9068 set thread context of 8236 9068 symrdserv.exe 421 PID 9260 set thread context of 9324 9260 symrdserv.exe 424 PID 9724 set thread context of 9792 9724 symrdserv.exe 438 PID 10068 set thread context of 10132 10068 symrdserv.exe 450 PID 1252 set thread context of 9520 1252 symrdserv.exe 466 PID 9836 set thread context of 1252 9836 symrdserv.exe 480 PID 10448 set thread context of 10500 10448 symrdserv.exe 487 PID 10764 set thread context of 10808 10764 symrdserv.exe 504 PID 11092 set thread context of 11148 11092 symrdserv.exe 516 PID 10620 set thread context of 10692 10620 symrdserv.exe 524 PID 11136 set thread context of 10684 11136 symrdserv.exe 539 PID 11136 set thread context of 11292 11136 symrdserv.exe 549 PID 11544 set thread context of 11604 11544 symrdserv.exe 562 PID 11860 set thread context of 11920 11860 symrdserv.exe 576 PID 12176 set thread context of 12240 12176 symrdserv.exe 588 PID 11656 set thread context of 11784 11656 symrdserv.exe 600 PID 12176 set thread context of 12244 12176 symrdserv.exe 610 PID 12328 set thread context of 12396 12328 symrdserv.exe 625 PID 12648 set thread context of 12704 12648 symrdserv.exe 636 PID 12964 set thread context of 13036 12964 symrdserv.exe 645 PID 13280 set thread context of 12176 13280 symrdserv.exe 657 PID 12796 set thread context of 12872 12796 symrdserv.exe 675 PID 12376 set thread context of 11412 12376 symrdserv.exe 678 PID 3536 set thread context of 5932 3536 symrdserv.exe 691 PID 13456 set thread context of 13504 13456 symrdserv.exe 702 PID 13800 set thread context of 13864 13800 symrdserv.exe 718 PID 14132 set thread context of 14236 14132 symrdserv.exe 734 PID 13280 set thread context of 13460 13280 symrdserv.exe 738 PID 14132 set thread context of 7832 14132 symrdserv.exe 752 PID 7220 set thread context of 7792 7220 symrdserv.exe 764 PID 7548 set thread context of 9248 7548 symrdserv.exe 776 PID 7480 set thread context of 9220 7480 symrdserv.exe 782 PID 3972 set thread context of 1048 3972 symrdserv.exe 798 PID 2264 set thread context of 14184 2264 symrdserv.exe 805 PID 5460 set thread context of 12900 5460 symrdserv.exe 818 PID 6000 set thread context of 6640 6000 symrdserv.exe 834 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 8480 9992 WerFault.exe 778 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 36 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symrdserv.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe Token: SeIncBasePriorityPrivilege 3772 symrdserv.exe Token: SeIncBasePriorityPrivilege 260 symrdserv.exe Token: SeIncBasePriorityPrivilege 4920 symrdserv.exe Token: SeIncBasePriorityPrivilege 1272 symrdserv.exe Token: SeIncBasePriorityPrivilege 724 symrdserv.exe Token: SeIncBasePriorityPrivilege 3856 symrdserv.exe Token: SeIncBasePriorityPrivilege 320 symrdserv.exe Token: SeIncBasePriorityPrivilege 3092 symrdserv.exe Token: SeIncBasePriorityPrivilege 1548 symrdserv.exe Token: SeIncBasePriorityPrivilege 4768 symrdserv.exe Token: SeIncBasePriorityPrivilege 5396 symrdserv.exe Token: SeIncBasePriorityPrivilege 5740 symrdserv.exe Token: SeIncBasePriorityPrivilege 6092 symrdserv.exe Token: SeIncBasePriorityPrivilege 5832 symrdserv.exe Token: SeIncBasePriorityPrivilege 6184 symrdserv.exe Token: SeIncBasePriorityPrivilege 6516 symrdserv.exe Token: SeIncBasePriorityPrivilege 6856 symrdserv.exe Token: SeIncBasePriorityPrivilege 5220 symrdserv.exe Token: SeIncBasePriorityPrivilege 6908 symrdserv.exe Token: SeIncBasePriorityPrivilege 7264 symrdserv.exe Token: SeIncBasePriorityPrivilege 7632 symrdserv.exe Token: SeIncBasePriorityPrivilege 8076 symrdserv.exe Token: SeIncBasePriorityPrivilege 7568 symrdserv.exe Token: SeIncBasePriorityPrivilege 8248 symrdserv.exe Token: SeIncBasePriorityPrivilege 8604 symrdserv.exe Token: SeIncBasePriorityPrivilege 8972 symrdserv.exe Token: SeIncBasePriorityPrivilege 8436 symrdserv.exe Token: SeIncBasePriorityPrivilege 8236 symrdserv.exe Token: SeIncBasePriorityPrivilege 9324 symrdserv.exe Token: SeIncBasePriorityPrivilege 9792 symrdserv.exe Token: SeIncBasePriorityPrivilege 10132 symrdserv.exe Token: SeIncBasePriorityPrivilege 9520 symrdserv.exe Token: SeIncBasePriorityPrivilege 1252 symrdserv.exe Token: SeIncBasePriorityPrivilege 10500 symrdserv.exe Token: SeIncBasePriorityPrivilege 10808 symrdserv.exe Token: SeIncBasePriorityPrivilege 11148 symrdserv.exe Token: SeIncBasePriorityPrivilege 10692 symrdserv.exe Token: SeIncBasePriorityPrivilege 10684 symrdserv.exe Token: SeIncBasePriorityPrivilege 11292 symrdserv.exe Token: SeIncBasePriorityPrivilege 11604 symrdserv.exe Token: SeIncBasePriorityPrivilege 11920 symrdserv.exe Token: SeIncBasePriorityPrivilege 12240 symrdserv.exe Token: SeIncBasePriorityPrivilege 11784 symrdserv.exe Token: SeIncBasePriorityPrivilege 12244 symrdserv.exe Token: SeIncBasePriorityPrivilege 12396 symrdserv.exe Token: SeIncBasePriorityPrivilege 12704 symrdserv.exe Token: SeIncBasePriorityPrivilege 13036 symrdserv.exe Token: SeIncBasePriorityPrivilege 12176 symrdserv.exe Token: SeIncBasePriorityPrivilege 12872 symrdserv.exe Token: SeIncBasePriorityPrivilege 11412 symrdserv.exe Token: SeIncBasePriorityPrivilege 5932 symrdserv.exe Token: SeIncBasePriorityPrivilege 13504 symrdserv.exe Token: SeIncBasePriorityPrivilege 13864 symrdserv.exe Token: SeIncBasePriorityPrivilege 14236 symrdserv.exe Token: SeIncBasePriorityPrivilege 13460 symrdserv.exe Token: SeIncBasePriorityPrivilege 7832 symrdserv.exe Token: SeIncBasePriorityPrivilege 7792 symrdserv.exe Token: SeCreateGlobalPrivilege 9992 dwm.exe Token: SeChangeNotifyPrivilege 9992 dwm.exe Token: 33 9992 dwm.exe Token: SeIncBasePriorityPrivilege 9992 dwm.exe Token: SeIncBasePriorityPrivilege 9248 symrdserv.exe Token: SeIncBasePriorityPrivilege 9220 symrdserv.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4628 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 2144 symrdserv.exe 4368 symrdserv.exe 1388 symrdserv.exe 4424 symrdserv.exe 4744 symrdserv.exe 2588 symrdserv.exe 4212 symrdserv.exe 4552 symrdserv.exe 4300 symrdserv.exe 4212 symrdserv.exe 5300 symrdserv.exe 5676 symrdserv.exe 6028 symrdserv.exe 5532 symrdserv.exe 5868 symrdserv.exe 6448 symrdserv.exe 6796 symrdserv.exe 7120 symrdserv.exe 6712 symrdserv.exe 7220 symrdserv.exe 7564 symrdserv.exe 8020 symrdserv.exe 7648 symrdserv.exe 7656 symrdserv.exe 8500 symrdserv.exe 8900 symrdserv.exe 8072 symrdserv.exe 9068 symrdserv.exe 9260 symrdserv.exe 9724 symrdserv.exe 10068 symrdserv.exe 1252 symrdserv.exe 9836 symrdserv.exe 10448 symrdserv.exe 10764 symrdserv.exe 11092 symrdserv.exe 10620 symrdserv.exe 11136 symrdserv.exe 11136 symrdserv.exe 11544 symrdserv.exe 11860 symrdserv.exe 12176 symrdserv.exe 11656 symrdserv.exe 12176 symrdserv.exe 12328 symrdserv.exe 12648 symrdserv.exe 12964 symrdserv.exe 13280 symrdserv.exe 12796 symrdserv.exe 12376 symrdserv.exe 3536 symrdserv.exe 13456 symrdserv.exe 13800 symrdserv.exe 14132 symrdserv.exe 13280 symrdserv.exe 14132 symrdserv.exe 7220 symrdserv.exe 7548 symrdserv.exe 7480 symrdserv.exe 3972 symrdserv.exe 2264 symrdserv.exe 5460 symrdserv.exe 6000 symrdserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4628 wrote to memory of 4880 4628 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 80 PID 4628 wrote to memory of 4880 4628 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 80 PID 4628 wrote to memory of 4880 4628 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 80 PID 4628 wrote to memory of 4880 4628 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 80 PID 4628 wrote to memory of 4880 4628 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 80 PID 4628 wrote to memory of 4880 4628 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 80 PID 4628 wrote to memory of 4880 4628 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 80 PID 4628 wrote to memory of 4880 4628 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 80 PID 4880 wrote to memory of 2144 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 81 PID 4880 wrote to memory of 2144 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 81 PID 4880 wrote to memory of 2144 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 81 PID 2144 wrote to memory of 3772 2144 symrdserv.exe 82 PID 2144 wrote to memory of 3772 2144 symrdserv.exe 82 PID 2144 wrote to memory of 3772 2144 symrdserv.exe 82 PID 4880 wrote to memory of 3980 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 83 PID 4880 wrote to memory of 3980 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 83 PID 4880 wrote to memory of 3980 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 83 PID 2144 wrote to memory of 3772 2144 symrdserv.exe 82 PID 2144 wrote to memory of 3772 2144 symrdserv.exe 82 PID 4880 wrote to memory of 2244 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 84 PID 4880 wrote to memory of 2244 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 84 PID 4880 wrote to memory of 2244 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 84 PID 2144 wrote to memory of 3772 2144 symrdserv.exe 82 PID 4880 wrote to memory of 4712 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 85 PID 4880 wrote to memory of 4712 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 85 PID 4880 wrote to memory of 4712 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 85 PID 2144 wrote to memory of 3772 2144 symrdserv.exe 82 PID 4880 wrote to memory of 4532 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 86 PID 4880 wrote to memory of 4532 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 86 PID 4880 wrote to memory of 4532 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 86 PID 2144 wrote to memory of 3772 2144 symrdserv.exe 82 PID 4880 wrote to memory of 4504 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 91 PID 4880 wrote to memory of 4504 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 91 PID 4880 wrote to memory of 4504 4880 b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe 91 PID 3772 wrote to memory of 4368 3772 symrdserv.exe 93 PID 3772 wrote to memory of 4368 3772 symrdserv.exe 93 PID 3772 wrote to memory of 4368 3772 symrdserv.exe 93 PID 3772 wrote to memory of 396 3772 symrdserv.exe 96 PID 3772 wrote to memory of 396 3772 symrdserv.exe 96 PID 3772 wrote to memory of 396 3772 symrdserv.exe 96 PID 4368 wrote to memory of 260 4368 symrdserv.exe 94 PID 4368 wrote to memory of 260 4368 symrdserv.exe 94 PID 4368 wrote to memory of 260 4368 symrdserv.exe 94 PID 3772 wrote to memory of 216 3772 symrdserv.exe 95 PID 3772 wrote to memory of 216 3772 symrdserv.exe 95 PID 3772 wrote to memory of 216 3772 symrdserv.exe 95 PID 4368 wrote to memory of 260 4368 symrdserv.exe 94 PID 4368 wrote to memory of 260 4368 symrdserv.exe 94 PID 3772 wrote to memory of 4256 3772 symrdserv.exe 102 PID 3772 wrote to memory of 4256 3772 symrdserv.exe 102 PID 3772 wrote to memory of 4256 3772 symrdserv.exe 102 PID 4368 wrote to memory of 260 4368 symrdserv.exe 94 PID 3772 wrote to memory of 3540 3772 symrdserv.exe 98 PID 3772 wrote to memory of 3540 3772 symrdserv.exe 98 PID 3772 wrote to memory of 3540 3772 symrdserv.exe 98 PID 4368 wrote to memory of 260 4368 symrdserv.exe 94 PID 3772 wrote to memory of 3012 3772 symrdserv.exe 101 PID 3772 wrote to memory of 3012 3772 symrdserv.exe 101 PID 3772 wrote to memory of 3012 3772 symrdserv.exe 101 PID 4368 wrote to memory of 260 4368 symrdserv.exe 94 PID 260 wrote to memory of 1388 260 symrdserv.exe 105 PID 260 wrote to memory of 1388 260 symrdserv.exe 105 PID 260 wrote to memory of 1388 260 symrdserv.exe 105 PID 260 wrote to memory of 2104 260 symrdserv.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe"C:\Users\Admin\AppData\Local\Temp\b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe"C:\Users\Admin\AppData\Local\Temp\b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1.exe"2⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"4⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"6⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:260 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1388 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"8⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4920 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4424 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"10⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1272 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4744 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"12⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:724 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2588 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"14⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3856 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4212 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"16⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:320 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4552 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"18⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3092 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4300 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"20⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1548 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4212 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"22⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4768 -
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"23⤵PID:5336
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul23⤵PID:5384
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"23⤵PID:5328
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com23⤵PID:5320
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip23⤵PID:5312
-
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5300
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul21⤵PID:1752
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"21⤵PID:2608
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"21⤵PID:4424
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com21⤵PID:4792
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip21⤵PID:3764
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip19⤵PID:1636
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com19⤵PID:5008
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"19⤵PID:1304
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"19⤵PID:1388
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul19⤵PID:4488
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com17⤵PID:1256
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"17⤵PID:4444
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul17⤵PID:4860
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"17⤵PID:1032
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip17⤵PID:4224
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com15⤵PID:224
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip15⤵PID:4372
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"15⤵PID:2044
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"15⤵PID:4748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul15⤵PID:2180
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com13⤵PID:4896
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"13⤵PID:4932
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"13⤵PID:4732
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul13⤵PID:4228
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip13⤵PID:3880
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip11⤵PID:5112
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com11⤵PID:3472
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"11⤵PID:976
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"11⤵PID:1020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul11⤵PID:2208
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip9⤵PID:2052
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com9⤵PID:1128
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"9⤵PID:5108
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"9⤵PID:4512
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul9⤵PID:2828
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip7⤵PID:2104
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com7⤵PID:4400
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"7⤵PID:3088
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"7⤵PID:2392
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul7⤵PID:1740
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com5⤵PID:216
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip5⤵PID:396
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"5⤵PID:3540
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul5⤵PID:3012
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"5⤵PID:4256
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:3980
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:2244
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"3⤵PID:4712
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"3⤵PID:4532
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\B9AD17~1.EXE > nul3⤵PID:4504
-
-
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"1⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5396 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5676 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5740 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul4⤵PID:4804
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"4⤵PID:6080
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"4⤵PID:6072
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com4⤵PID:6064
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:6052
-
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:6028
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul2⤵PID:5752
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:5720
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:5712
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:5704
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:5696
-
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"1⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:6092 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5532 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"3⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5832 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5868 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"5⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6184 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:6448 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"7⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6516 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:6796 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"9⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6856 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:7120 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"11⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5220 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:6712 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"13⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6908 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:7220 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"15⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:7264 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:7564 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"17⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:7632 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"18⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:8020 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"19⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:8076 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:7648 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"21⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:7568 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:7656 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"23⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:8248 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:8500 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"25⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:8604 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"26⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:8900 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"27⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:8972 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"28⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:8072 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"29⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:8436 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"30⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:9068 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"31⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:8236 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:9260 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"33⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:9324 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"34⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:9724 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"35⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:9792 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"36⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:10068 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"37⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:10132 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"38⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1252 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"39⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:9520 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"40⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:9836 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"41⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1252 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"42⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:10448 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"43⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:10500 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"44⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:10764 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"45⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:10808 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"46⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:11092 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"47⤵
- Drops file in Drivers directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:11148 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"48⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:10620 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"49⤵
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:10692 -
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip50⤵PID:11236
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul50⤵PID:11152
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"50⤵PID:1424
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"50⤵PID:1920
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com50⤵PID:11092
-
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"50⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:11136
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"48⤵PID:10472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul48⤵PID:10744
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"48⤵PID:10452
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com48⤵PID:10508
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip48⤵PID:10636
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"46⤵PID:11124
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul46⤵PID:11192
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"46⤵PID:11116
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com46⤵PID:11108
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip46⤵PID:11100
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"44⤵PID:10816
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul44⤵PID:10840
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"44⤵PID:10800
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com44⤵PID:10792
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip44⤵PID:10780
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com42⤵PID:10476
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul42⤵PID:10516
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"42⤵PID:10492
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"42⤵PID:10484
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip42⤵PID:10464
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"40⤵PID:10236
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"40⤵PID:9796
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul40⤵PID:9948
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com40⤵PID:10008
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip40⤵PID:3848
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"38⤵PID:9512
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"38⤵PID:4116
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com38⤵PID:4460
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip38⤵PID:5104
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul38⤵PID:9872
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul36⤵PID:10124
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"36⤵PID:10104
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"36⤵PID:10096
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com36⤵PID:10088
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip36⤵PID:10080
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"34⤵PID:9776
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"34⤵PID:9768
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com34⤵PID:9760
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip34⤵PID:9748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul34⤵PID:9800
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"32⤵PID:9296
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul32⤵PID:9312
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"32⤵PID:9288
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com32⤵PID:9280
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip32⤵PID:9272
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip30⤵PID:9088
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com30⤵PID:9148
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"30⤵PID:8980
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"30⤵PID:8904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul30⤵PID:8900
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"28⤵PID:8276
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"28⤵PID:8292
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com28⤵PID:8256
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip28⤵PID:8028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul28⤵PID:8412
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip26⤵PID:8908
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul26⤵PID:8964
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"26⤵PID:8944
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"26⤵PID:8936
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com26⤵PID:8928
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"24⤵PID:8536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul24⤵PID:8556
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"24⤵PID:8528
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com24⤵PID:8520
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip24⤵PID:8512
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul22⤵PID:8240
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"22⤵PID:8220
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"22⤵PID:8212
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com22⤵PID:8204
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip22⤵PID:7404
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"20⤵PID:7740
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"20⤵PID:7788
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com20⤵PID:7676
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip20⤵PID:7664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul20⤵PID:7752
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"18⤵PID:8064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul18⤵PID:8092
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"18⤵PID:8056
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com18⤵PID:8048
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip18⤵PID:8036
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul16⤵PID:7624
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"16⤵PID:7604
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"16⤵PID:7596
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com16⤵PID:7588
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip16⤵PID:7576
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"14⤵PID:7272
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul14⤵PID:7292
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"14⤵PID:7256
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com14⤵PID:7248
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip14⤵PID:7240
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul12⤵PID:6988
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"12⤵PID:6904
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"12⤵PID:6888
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com12⤵PID:6520
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip12⤵PID:6748
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"10⤵PID:7156
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul10⤵PID:5488
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"10⤵PID:7148
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com10⤵PID:7140
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip10⤵PID:7132
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"8⤵PID:6836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul8⤵PID:6868
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"8⤵PID:6828
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com8⤵PID:6820
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip8⤵PID:6812
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul6⤵PID:6564
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"6⤵PID:6496
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"6⤵PID:6488
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com6⤵PID:6480
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip6⤵PID:6472
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"4⤵PID:6172
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"4⤵PID:6160
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul4⤵PID:6196
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com4⤵PID:6152
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:6128
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:5904
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:5788
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:5764
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:5688
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul2⤵PID:5732
-
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"1⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:10684 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:11136 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"3⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:11292 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:11544 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"5⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:11604 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:11860 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"7⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:11920 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"8⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:12176 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"9⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:12240 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"10⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:11656 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"11⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:11784 -
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"12⤵PID:3532
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul12⤵PID:11476
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"12⤵PID:1904
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com12⤵PID:3452
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip12⤵PID:5084
-
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"12⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:12176
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"10⤵PID:11548
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"10⤵PID:11600
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul10⤵PID:11904
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com10⤵PID:11732
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip10⤵PID:11760
-
-
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"9⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:12244 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"10⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:12328 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"11⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:12396 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"12⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:12648 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"13⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:12704 -
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"14⤵PID:12996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul14⤵PID:13012
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"14⤵PID:12988
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com14⤵PID:12980
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip14⤵PID:12972
-
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"14⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:12964
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"12⤵PID:12688
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul12⤵PID:12748
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"12⤵PID:12676
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com12⤵PID:12668
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip12⤵PID:12660
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"10⤵PID:12364
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"10⤵PID:12356
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com10⤵PID:12348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul10⤵PID:12384
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip10⤵PID:12340
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"8⤵PID:12204
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"8⤵PID:12212
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com8⤵PID:12192
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip8⤵PID:12184
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul8⤵PID:12276
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"6⤵PID:11896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul6⤵PID:11960
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"6⤵PID:11888
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com6⤵PID:11880
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip6⤵PID:11872
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"4⤵PID:11580
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"4⤵PID:11572
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com4⤵PID:11564
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:11556
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul4⤵PID:11644
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:628
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:3028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul2⤵PID:11284
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:5012
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:4540
-
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"1⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:13036 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:13280 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"3⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:12176 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:12796 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"5⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:12872 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:12376 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"7⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:11412 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"8⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3536 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"9⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5932 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"10⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:13456 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"11⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:13504 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"12⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:13800 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"13⤵
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:13864 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul14⤵PID:14176
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"14⤵PID:14164
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"14⤵PID:14156
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com14⤵PID:14148
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip14⤵PID:14140
-
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"14⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:14132 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"15⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:14236 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"16⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:13280 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"17⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:13460 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"18⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:14132 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"19⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:7832 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"20⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:7220 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"21⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:7792 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"22⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:7548 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"23⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:9248 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"24⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:7480 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"25⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:9220 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"26⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3972 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"27⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
PID:1048 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"28⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2264 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"29⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:14184 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"30⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5460 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"31⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:12900 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"32⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:6000 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"33⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:6640 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"34⤵PID:10700
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"35⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:6572 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"36⤵PID:9120
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"37⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:13324 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"38⤵PID:2544
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"39⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:11588 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"40⤵PID:8480
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"41⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:13212 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"42⤵PID:13736
-
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\SysWOW64\symrdserv.exe"43⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:7492 -
C:\Windows\SysWOW64\symrdserv.exe"C:\Windows\system32\symrdserv.exe"44⤵PID:5448
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"42⤵PID:3652
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul42⤵PID:13424
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"42⤵PID:9208
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com42⤵PID:10400
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip42⤵PID:10700
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"40⤵PID:4520
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"40⤵PID:6108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul40⤵PID:1224
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com40⤵PID:12616
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip40⤵PID:5580
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul38⤵PID:7436
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"38⤵PID:6584
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"38⤵PID:6896
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com38⤵PID:3680
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip38⤵PID:11640
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"36⤵PID:7700
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"36⤵PID:7724
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com36⤵PID:7684
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip36⤵PID:7220
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul36⤵PID:7452
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip34⤵PID:13728
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul34⤵PID:14048
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"34⤵PID:6228
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"34⤵PID:6268
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com34⤵PID:5520
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com32⤵PID:13208
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"32⤵PID:12544
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul32⤵PID:6596
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"32⤵PID:6372
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip32⤵PID:5956
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"30⤵PID:5544
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"30⤵PID:12896
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com30⤵PID:12888
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip30⤵PID:12876
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul30⤵PID:12956
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul28⤵PID:4656
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"28⤵PID:11632
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"28⤵PID:11508
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com28⤵PID:11484
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip28⤵PID:3132
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"26⤵PID:616
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul26⤵PID:11496
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"26⤵PID:10316
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com26⤵PID:10368
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip26⤵PID:10728
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip24⤵PID:14296
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"24⤵PID:8448
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"24⤵PID:14012
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul24⤵PID:8828
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com24⤵PID:14300
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip22⤵PID:5532
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"20⤵PID:7984
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul20⤵PID:7472
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"20⤵PID:8080
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com20⤵PID:7448
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip20⤵PID:13984
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul18⤵PID:7048
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"18⤵PID:13664
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"18⤵PID:7804
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com18⤵PID:7796
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip18⤵PID:7784
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul16⤵PID:13472
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"16⤵PID:13632
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"16⤵PID:13544
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com16⤵PID:13560
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip16⤵PID:13532
-
-
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip12⤵PID:13808
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com12⤵PID:13816
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul12⤵PID:13852
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"12⤵PID:13832
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"12⤵PID:13824
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul10⤵PID:13564
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"10⤵PID:13516
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"10⤵PID:13496
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com10⤵PID:13488
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip10⤵PID:13476
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip8⤵PID:12416
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul8⤵PID:5380
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"8⤵PID:12272
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"8⤵PID:12696
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com8⤵PID:12856
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul6⤵PID:12700
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"6⤵PID:4744
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"6⤵PID:5440
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com6⤵PID:5476
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip6⤵PID:5468
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:12836
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com4⤵PID:12860
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"4⤵PID:12652
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"4⤵PID:12712
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul4⤵PID:12648
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:11932
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:13308
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:13300
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:13292
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\SYMRDS~1.EXE > nul2⤵PID:972
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:9992 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 9992 -s 30602⤵
- Program crash
PID:8480
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 9992 -ip 99921⤵PID:12924
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:9308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
72KB
MD572ab19f661fc9d551504aa6b696592c6
SHA175110b40ee6a9999a387aa47b2070c389de77cf4
SHA256b9ad17a47f8261336662ad7f77445fa6097c712eb3771bdb1c8c889e7baa09a1
SHA5126e2a740b8b857cd8b7713594397f08978cb643f0758e2d7d10546ef5326ae608081487304d3fd37a41a013a2ea7514f4395522ac5134373978e9fdaf38cd7449
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289
-
Filesize
11KB
MD55798755da6ca8d710608c178f60dfd8b
SHA1a5876da64c66f07148c958f5565b8a79ddf2f601
SHA256e93d762e1ed85e6de53e32483e7be88842cebe806ed0d9391aac29b4833d8710
SHA5127e60849bba465ab60ac6ad2694ecd5a435fa7077140e12002447bb43221ba09e98d5a5266eedf77331a7b1ca59862ca94c41f99941d158b9ca6d0af2a061c289