Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 13:46
Static task
static1
Behavioral task
behavioral1
Sample
0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe
Resource
win10v2004-20240802-en
General
-
Target
0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe
-
Size
326KB
-
MD5
98501f40768d2af42017c79368a0695b
-
SHA1
20112e3e53f4443b18934ba8d60f513b28d14e60
-
SHA256
0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa
-
SHA512
b8690d8a7c94fd5ba8e6f28c0cb241adeb2635cc2404ac6b6ff66044310ac09f584df8db693ff939bde6aaa991b01cd2427f8d7b47139faad9a7c3aa3ccb5acc
-
SSDEEP
6144:yPUYxfzPba9h5MKajqBiUwzzHRyultSexze5QQhuYlwdhp4y9C6wOQhW8U9ETDRd:ZkbPbahMKajqUUwzzHRyultSexze5QQ9
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (61) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\Geo\Nation ZMoYksgk.exe -
Executes dropped EXE 2 IoCs
pid Process 1416 ZMoYksgk.exe 2344 zioIgcQU.exe -
Loads dropped DLL 20 IoCs
pid Process 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\ZMoYksgk.exe = "C:\\Users\\Admin\\zkEYAIEk\\ZMoYksgk.exe" 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zioIgcQU.exe = "C:\\ProgramData\\zeIscwAk\\zioIgcQU.exe" 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\ZMoYksgk.exe = "C:\\Users\\Admin\\zkEYAIEk\\ZMoYksgk.exe" ZMoYksgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zioIgcQU.exe = "C:\\ProgramData\\zeIscwAk\\zioIgcQU.exe" zioIgcQU.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico ZMoYksgk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2568 reg.exe 2748 reg.exe 2268 reg.exe 768 reg.exe 3048 reg.exe 960 reg.exe 2508 reg.exe 2304 reg.exe 2024 reg.exe 1508 reg.exe 2628 reg.exe 1488 reg.exe 2932 reg.exe 2104 reg.exe 2704 reg.exe 3044 reg.exe 1304 reg.exe 1744 reg.exe 1744 reg.exe 2804 reg.exe 960 reg.exe 2144 reg.exe 2160 reg.exe 1788 reg.exe 2044 reg.exe 1976 reg.exe 2820 reg.exe 852 reg.exe 2684 reg.exe 2704 reg.exe 2328 reg.exe 1004 reg.exe 936 reg.exe 2104 reg.exe 1068 reg.exe 2616 reg.exe 3044 reg.exe 2876 reg.exe 772 reg.exe 2756 reg.exe 848 reg.exe 2472 reg.exe 1192 reg.exe 1608 reg.exe 2320 reg.exe 3024 reg.exe 2052 reg.exe 2112 reg.exe 1912 reg.exe 2000 reg.exe 1052 reg.exe 2956 reg.exe 2752 reg.exe 316 reg.exe 1468 reg.exe 2792 reg.exe 2208 reg.exe 1896 reg.exe 852 reg.exe 572 reg.exe 2060 reg.exe 1020 reg.exe 1704 reg.exe 2604 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1780 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1780 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 588 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 588 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1296 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1296 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1444 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1444 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1508 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1508 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2768 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2768 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2352 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2352 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2164 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2164 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2580 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2580 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2500 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2500 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2320 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2320 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2820 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2820 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1740 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1740 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2896 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2896 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1704 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1704 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 3052 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 3052 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1632 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1632 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2264 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2264 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1696 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1696 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 340 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 340 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2376 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2376 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1984 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1984 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2252 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2252 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2776 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2776 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2892 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2892 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 704 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 704 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2144 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2144 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1712 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 1712 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2092 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2092 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2872 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 2872 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1416 ZMoYksgk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe 1416 ZMoYksgk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2888 wrote to memory of 1416 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 31 PID 2888 wrote to memory of 1416 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 31 PID 2888 wrote to memory of 1416 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 31 PID 2888 wrote to memory of 1416 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 31 PID 2888 wrote to memory of 2344 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 32 PID 2888 wrote to memory of 2344 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 32 PID 2888 wrote to memory of 2344 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 32 PID 2888 wrote to memory of 2344 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 32 PID 2888 wrote to memory of 1908 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 33 PID 2888 wrote to memory of 1908 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 33 PID 2888 wrote to memory of 1908 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 33 PID 2888 wrote to memory of 1908 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 33 PID 1908 wrote to memory of 2172 1908 cmd.exe 35 PID 1908 wrote to memory of 2172 1908 cmd.exe 35 PID 1908 wrote to memory of 2172 1908 cmd.exe 35 PID 1908 wrote to memory of 2172 1908 cmd.exe 35 PID 2888 wrote to memory of 2688 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 36 PID 2888 wrote to memory of 2688 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 36 PID 2888 wrote to memory of 2688 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 36 PID 2888 wrote to memory of 2688 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 36 PID 2888 wrote to memory of 2744 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 37 PID 2888 wrote to memory of 2744 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 37 PID 2888 wrote to memory of 2744 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 37 PID 2888 wrote to memory of 2744 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 37 PID 2888 wrote to memory of 2772 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 39 PID 2888 wrote to memory of 2772 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 39 PID 2888 wrote to memory of 2772 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 39 PID 2888 wrote to memory of 2772 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 39 PID 2888 wrote to memory of 2760 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 41 PID 2888 wrote to memory of 2760 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 41 PID 2888 wrote to memory of 2760 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 41 PID 2888 wrote to memory of 2760 2888 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 41 PID 2760 wrote to memory of 2568 2760 cmd.exe 44 PID 2760 wrote to memory of 2568 2760 cmd.exe 44 PID 2760 wrote to memory of 2568 2760 cmd.exe 44 PID 2760 wrote to memory of 2568 2760 cmd.exe 44 PID 2172 wrote to memory of 2996 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 45 PID 2172 wrote to memory of 2996 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 45 PID 2172 wrote to memory of 2996 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 45 PID 2172 wrote to memory of 2996 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 45 PID 2996 wrote to memory of 1780 2996 cmd.exe 47 PID 2996 wrote to memory of 1780 2996 cmd.exe 47 PID 2996 wrote to memory of 1780 2996 cmd.exe 47 PID 2996 wrote to memory of 1780 2996 cmd.exe 47 PID 2172 wrote to memory of 3012 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 48 PID 2172 wrote to memory of 3012 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 48 PID 2172 wrote to memory of 3012 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 48 PID 2172 wrote to memory of 3012 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 48 PID 2172 wrote to memory of 376 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 49 PID 2172 wrote to memory of 376 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 49 PID 2172 wrote to memory of 376 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 49 PID 2172 wrote to memory of 376 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 49 PID 2172 wrote to memory of 484 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 51 PID 2172 wrote to memory of 484 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 51 PID 2172 wrote to memory of 484 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 51 PID 2172 wrote to memory of 484 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 51 PID 2172 wrote to memory of 2716 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 53 PID 2172 wrote to memory of 2716 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 53 PID 2172 wrote to memory of 2716 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 53 PID 2172 wrote to memory of 2716 2172 0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe 53 PID 2716 wrote to memory of 1208 2716 cmd.exe 56 PID 2716 wrote to memory of 1208 2716 cmd.exe 56 PID 2716 wrote to memory of 1208 2716 cmd.exe 56 PID 2716 wrote to memory of 1208 2716 cmd.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe"C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\zkEYAIEk\ZMoYksgk.exe"C:\Users\Admin\zkEYAIEk\ZMoYksgk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1416
-
-
C:\ProgramData\zeIscwAk\zioIgcQU.exe"C:\ProgramData\zeIscwAk\zioIgcQU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2344
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"4⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"6⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa7⤵
- Suspicious behavior: EnumeratesProcesses
PID:588 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"8⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"10⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"12⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"14⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"16⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"18⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"20⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"22⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"24⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"26⤵
- System Location Discovery: System Language Discovery
PID:276 -
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"28⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"30⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"32⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"34⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"36⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"38⤵
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"40⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"42⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa43⤵
- Suspicious behavior: EnumeratesProcesses
PID:340 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"44⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"46⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"48⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"50⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"52⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"54⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa55⤵
- Suspicious behavior: EnumeratesProcesses
PID:704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"56⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"58⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"60⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2092 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"62⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"64⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa65⤵PID:2184
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"66⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa67⤵PID:1232
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"68⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa69⤵PID:2960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"70⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa71⤵PID:840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"72⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa73⤵PID:1044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"74⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa75⤵PID:1832
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"76⤵
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa77⤵PID:904
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"78⤵
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa79⤵PID:2184
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"80⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa81⤵PID:2268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"82⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa83⤵PID:1532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"84⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa85⤵
- System Location Discovery: System Language Discovery
PID:324 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"86⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa87⤵PID:2748
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"88⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa89⤵
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"90⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa91⤵PID:1664
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"92⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa93⤵PID:2324
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"94⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa95⤵PID:1232
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"96⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa97⤵PID:2508
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"98⤵
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa99⤵PID:2332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"100⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa101⤵PID:2956
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"102⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa103⤵PID:2360
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"104⤵
- System Location Discovery: System Language Discovery
PID:548 -
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa105⤵
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"106⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa107⤵PID:1048
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"108⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa109⤵PID:2308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"110⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa111⤵PID:2120
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"112⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa113⤵PID:3052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"114⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa115⤵PID:2572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"116⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa117⤵PID:1832
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"118⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa119⤵PID:2888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"120⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa.exeC:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa121⤵PID:2876
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa"122⤵PID:936
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-