Analysis
-
max time kernel
120s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
561ae02e1e738b522ea1feb1a1475580N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
561ae02e1e738b522ea1feb1a1475580N.exe
Resource
win10v2004-20240802-en
General
-
Target
561ae02e1e738b522ea1feb1a1475580N.exe
-
Size
121KB
-
MD5
561ae02e1e738b522ea1feb1a1475580
-
SHA1
f160c95c205b28dd4512e872f00fd3af0935e429
-
SHA256
25aa906488ecd75d67ecd7a9e620da17cfa341fb1f2ea26e9388c5efeeb7a1bf
-
SHA512
922d137d3bbdd50e869f899bbd3a53194ecef4e0a78b65d30a8d677df9c7e5658bd7eba0ad57f6e1b4180b4656ccf0dfe7786833af5c40d8ccbd35cbd6028352
-
SSDEEP
3072:iFrmfrydPCAewNgSbDSfxEWVHhEE8q8888888888888888888H:SmOhAKjVES/
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 62 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\Geo\Nation hIAokQcE.exe -
Deletes itself 1 IoCs
pid Process 1736 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1996 hIAokQcE.exe 2744 MMQYUEsg.exe -
Loads dropped DLL 20 IoCs
pid Process 320 561ae02e1e738b522ea1feb1a1475580N.exe 320 561ae02e1e738b522ea1feb1a1475580N.exe 320 561ae02e1e738b522ea1feb1a1475580N.exe 320 561ae02e1e738b522ea1feb1a1475580N.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\hIAokQcE.exe = "C:\\Users\\Admin\\OSAckMQE\\hIAokQcE.exe" 561ae02e1e738b522ea1feb1a1475580N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MMQYUEsg.exe = "C:\\ProgramData\\ZkIQUAEg\\MMQYUEsg.exe" 561ae02e1e738b522ea1feb1a1475580N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\hIAokQcE.exe = "C:\\Users\\Admin\\OSAckMQE\\hIAokQcE.exe" hIAokQcE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MMQYUEsg.exe = "C:\\ProgramData\\ZkIQUAEg\\MMQYUEsg.exe" MMQYUEsg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico hIAokQcE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1868 reg.exe 1860 reg.exe 2576 reg.exe 880 reg.exe 2764 reg.exe 2720 reg.exe 1872 reg.exe 540 reg.exe 444 reg.exe 2380 reg.exe 3036 reg.exe 568 reg.exe 2824 reg.exe 916 reg.exe 488 reg.exe 2332 reg.exe 2636 reg.exe 1988 reg.exe 2500 reg.exe 2272 reg.exe 1708 reg.exe 1916 reg.exe 2372 reg.exe 1020 reg.exe 1044 reg.exe 844 reg.exe 3040 reg.exe 340 reg.exe 2120 reg.exe 2944 reg.exe 2076 reg.exe 1488 reg.exe 2276 reg.exe 2260 reg.exe 1716 reg.exe 1548 reg.exe 1680 reg.exe 2200 reg.exe 2404 reg.exe 2228 reg.exe 2188 reg.exe 2956 reg.exe 708 reg.exe 2940 reg.exe 488 reg.exe 580 reg.exe 1676 reg.exe 2644 reg.exe 2892 reg.exe 1148 reg.exe 2792 reg.exe 2628 reg.exe 1512 reg.exe 2376 reg.exe 1992 reg.exe 2740 reg.exe 2500 reg.exe 1696 reg.exe 880 reg.exe 3000 reg.exe 1872 reg.exe 2824 reg.exe 3020 reg.exe 1656 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 320 561ae02e1e738b522ea1feb1a1475580N.exe 320 561ae02e1e738b522ea1feb1a1475580N.exe 2708 561ae02e1e738b522ea1feb1a1475580N.exe 2708 561ae02e1e738b522ea1feb1a1475580N.exe 2872 561ae02e1e738b522ea1feb1a1475580N.exe 2872 561ae02e1e738b522ea1feb1a1475580N.exe 844 561ae02e1e738b522ea1feb1a1475580N.exe 844 561ae02e1e738b522ea1feb1a1475580N.exe 2384 561ae02e1e738b522ea1feb1a1475580N.exe 2384 561ae02e1e738b522ea1feb1a1475580N.exe 2404 561ae02e1e738b522ea1feb1a1475580N.exe 2404 561ae02e1e738b522ea1feb1a1475580N.exe 1256 561ae02e1e738b522ea1feb1a1475580N.exe 1256 561ae02e1e738b522ea1feb1a1475580N.exe 2196 561ae02e1e738b522ea1feb1a1475580N.exe 2196 561ae02e1e738b522ea1feb1a1475580N.exe 2272 561ae02e1e738b522ea1feb1a1475580N.exe 2272 561ae02e1e738b522ea1feb1a1475580N.exe 2024 561ae02e1e738b522ea1feb1a1475580N.exe 2024 561ae02e1e738b522ea1feb1a1475580N.exe 2428 561ae02e1e738b522ea1feb1a1475580N.exe 2428 561ae02e1e738b522ea1feb1a1475580N.exe 2432 561ae02e1e738b522ea1feb1a1475580N.exe 2432 561ae02e1e738b522ea1feb1a1475580N.exe 1488 561ae02e1e738b522ea1feb1a1475580N.exe 1488 561ae02e1e738b522ea1feb1a1475580N.exe 2788 561ae02e1e738b522ea1feb1a1475580N.exe 2788 561ae02e1e738b522ea1feb1a1475580N.exe 2864 561ae02e1e738b522ea1feb1a1475580N.exe 2864 561ae02e1e738b522ea1feb1a1475580N.exe 580 561ae02e1e738b522ea1feb1a1475580N.exe 580 561ae02e1e738b522ea1feb1a1475580N.exe 1964 561ae02e1e738b522ea1feb1a1475580N.exe 1964 561ae02e1e738b522ea1feb1a1475580N.exe 928 561ae02e1e738b522ea1feb1a1475580N.exe 928 561ae02e1e738b522ea1feb1a1475580N.exe 2836 561ae02e1e738b522ea1feb1a1475580N.exe 2836 561ae02e1e738b522ea1feb1a1475580N.exe 2708 561ae02e1e738b522ea1feb1a1475580N.exe 2708 561ae02e1e738b522ea1feb1a1475580N.exe 1696 561ae02e1e738b522ea1feb1a1475580N.exe 1696 561ae02e1e738b522ea1feb1a1475580N.exe 2504 561ae02e1e738b522ea1feb1a1475580N.exe 2504 561ae02e1e738b522ea1feb1a1475580N.exe 1708 561ae02e1e738b522ea1feb1a1475580N.exe 1708 561ae02e1e738b522ea1feb1a1475580N.exe 880 561ae02e1e738b522ea1feb1a1475580N.exe 880 561ae02e1e738b522ea1feb1a1475580N.exe 2088 561ae02e1e738b522ea1feb1a1475580N.exe 2088 561ae02e1e738b522ea1feb1a1475580N.exe 2044 561ae02e1e738b522ea1feb1a1475580N.exe 2044 561ae02e1e738b522ea1feb1a1475580N.exe 2816 561ae02e1e738b522ea1feb1a1475580N.exe 2816 561ae02e1e738b522ea1feb1a1475580N.exe 1256 561ae02e1e738b522ea1feb1a1475580N.exe 1256 561ae02e1e738b522ea1feb1a1475580N.exe 2228 561ae02e1e738b522ea1feb1a1475580N.exe 2228 561ae02e1e738b522ea1feb1a1475580N.exe 640 561ae02e1e738b522ea1feb1a1475580N.exe 640 561ae02e1e738b522ea1feb1a1475580N.exe 2672 561ae02e1e738b522ea1feb1a1475580N.exe 2672 561ae02e1e738b522ea1feb1a1475580N.exe 2556 561ae02e1e738b522ea1feb1a1475580N.exe 2556 561ae02e1e738b522ea1feb1a1475580N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1996 hIAokQcE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe 1996 hIAokQcE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 320 wrote to memory of 1996 320 561ae02e1e738b522ea1feb1a1475580N.exe 29 PID 320 wrote to memory of 1996 320 561ae02e1e738b522ea1feb1a1475580N.exe 29 PID 320 wrote to memory of 1996 320 561ae02e1e738b522ea1feb1a1475580N.exe 29 PID 320 wrote to memory of 1996 320 561ae02e1e738b522ea1feb1a1475580N.exe 29 PID 320 wrote to memory of 2744 320 561ae02e1e738b522ea1feb1a1475580N.exe 30 PID 320 wrote to memory of 2744 320 561ae02e1e738b522ea1feb1a1475580N.exe 30 PID 320 wrote to memory of 2744 320 561ae02e1e738b522ea1feb1a1475580N.exe 30 PID 320 wrote to memory of 2744 320 561ae02e1e738b522ea1feb1a1475580N.exe 30 PID 320 wrote to memory of 2960 320 561ae02e1e738b522ea1feb1a1475580N.exe 31 PID 320 wrote to memory of 2960 320 561ae02e1e738b522ea1feb1a1475580N.exe 31 PID 320 wrote to memory of 2960 320 561ae02e1e738b522ea1feb1a1475580N.exe 31 PID 320 wrote to memory of 2960 320 561ae02e1e738b522ea1feb1a1475580N.exe 31 PID 2960 wrote to memory of 2708 2960 cmd.exe 33 PID 2960 wrote to memory of 2708 2960 cmd.exe 33 PID 2960 wrote to memory of 2708 2960 cmd.exe 33 PID 2960 wrote to memory of 2708 2960 cmd.exe 33 PID 320 wrote to memory of 2196 320 561ae02e1e738b522ea1feb1a1475580N.exe 34 PID 320 wrote to memory of 2196 320 561ae02e1e738b522ea1feb1a1475580N.exe 34 PID 320 wrote to memory of 2196 320 561ae02e1e738b522ea1feb1a1475580N.exe 34 PID 320 wrote to memory of 2196 320 561ae02e1e738b522ea1feb1a1475580N.exe 34 PID 320 wrote to memory of 2944 320 561ae02e1e738b522ea1feb1a1475580N.exe 35 PID 320 wrote to memory of 2944 320 561ae02e1e738b522ea1feb1a1475580N.exe 35 PID 320 wrote to memory of 2944 320 561ae02e1e738b522ea1feb1a1475580N.exe 35 PID 320 wrote to memory of 2944 320 561ae02e1e738b522ea1feb1a1475580N.exe 35 PID 320 wrote to memory of 2764 320 561ae02e1e738b522ea1feb1a1475580N.exe 36 PID 320 wrote to memory of 2764 320 561ae02e1e738b522ea1feb1a1475580N.exe 36 PID 320 wrote to memory of 2764 320 561ae02e1e738b522ea1feb1a1475580N.exe 36 PID 320 wrote to memory of 2764 320 561ae02e1e738b522ea1feb1a1475580N.exe 36 PID 320 wrote to memory of 3016 320 561ae02e1e738b522ea1feb1a1475580N.exe 39 PID 320 wrote to memory of 3016 320 561ae02e1e738b522ea1feb1a1475580N.exe 39 PID 320 wrote to memory of 3016 320 561ae02e1e738b522ea1feb1a1475580N.exe 39 PID 320 wrote to memory of 3016 320 561ae02e1e738b522ea1feb1a1475580N.exe 39 PID 3016 wrote to memory of 2648 3016 cmd.exe 42 PID 3016 wrote to memory of 2648 3016 cmd.exe 42 PID 3016 wrote to memory of 2648 3016 cmd.exe 42 PID 3016 wrote to memory of 2648 3016 cmd.exe 42 PID 2708 wrote to memory of 604 2708 561ae02e1e738b522ea1feb1a1475580N.exe 43 PID 2708 wrote to memory of 604 2708 561ae02e1e738b522ea1feb1a1475580N.exe 43 PID 2708 wrote to memory of 604 2708 561ae02e1e738b522ea1feb1a1475580N.exe 43 PID 2708 wrote to memory of 604 2708 561ae02e1e738b522ea1feb1a1475580N.exe 43 PID 604 wrote to memory of 2872 604 cmd.exe 45 PID 604 wrote to memory of 2872 604 cmd.exe 45 PID 604 wrote to memory of 2872 604 cmd.exe 45 PID 604 wrote to memory of 2872 604 cmd.exe 45 PID 2708 wrote to memory of 1708 2708 561ae02e1e738b522ea1feb1a1475580N.exe 46 PID 2708 wrote to memory of 1708 2708 561ae02e1e738b522ea1feb1a1475580N.exe 46 PID 2708 wrote to memory of 1708 2708 561ae02e1e738b522ea1feb1a1475580N.exe 46 PID 2708 wrote to memory of 1708 2708 561ae02e1e738b522ea1feb1a1475580N.exe 46 PID 2708 wrote to memory of 2272 2708 561ae02e1e738b522ea1feb1a1475580N.exe 47 PID 2708 wrote to memory of 2272 2708 561ae02e1e738b522ea1feb1a1475580N.exe 47 PID 2708 wrote to memory of 2272 2708 561ae02e1e738b522ea1feb1a1475580N.exe 47 PID 2708 wrote to memory of 2272 2708 561ae02e1e738b522ea1feb1a1475580N.exe 47 PID 2708 wrote to memory of 1776 2708 561ae02e1e738b522ea1feb1a1475580N.exe 48 PID 2708 wrote to memory of 1776 2708 561ae02e1e738b522ea1feb1a1475580N.exe 48 PID 2708 wrote to memory of 1776 2708 561ae02e1e738b522ea1feb1a1475580N.exe 48 PID 2708 wrote to memory of 1776 2708 561ae02e1e738b522ea1feb1a1475580N.exe 48 PID 2708 wrote to memory of 2308 2708 561ae02e1e738b522ea1feb1a1475580N.exe 49 PID 2708 wrote to memory of 2308 2708 561ae02e1e738b522ea1feb1a1475580N.exe 49 PID 2708 wrote to memory of 2308 2708 561ae02e1e738b522ea1feb1a1475580N.exe 49 PID 2708 wrote to memory of 2308 2708 561ae02e1e738b522ea1feb1a1475580N.exe 49 PID 2308 wrote to memory of 1556 2308 cmd.exe 54 PID 2308 wrote to memory of 1556 2308 cmd.exe 54 PID 2308 wrote to memory of 1556 2308 cmd.exe 54 PID 2308 wrote to memory of 1556 2308 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exe"C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\OSAckMQE\hIAokQcE.exe"C:\Users\Admin\OSAckMQE\hIAokQcE.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1996
-
-
C:\ProgramData\ZkIQUAEg\MMQYUEsg.exe"C:\ProgramData\ZkIQUAEg\MMQYUEsg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2744
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"2⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"4⤵
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"6⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N7⤵
- Suspicious behavior: EnumeratesProcesses
PID:844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"8⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"10⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"12⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"14⤵
- System Location Discovery: System Language Discovery
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N15⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"16⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"18⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"20⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"22⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"24⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"26⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"28⤵
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"30⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N31⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:580 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"32⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"34⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N35⤵
- Suspicious behavior: EnumeratesProcesses
PID:928 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"36⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"38⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"40⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"42⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"44⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"46⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N47⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"48⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"50⤵
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"52⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"54⤵
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"56⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"58⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N59⤵
- Suspicious behavior: EnumeratesProcesses
PID:640 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"60⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"62⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"64⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N65⤵PID:1992
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"66⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N67⤵PID:2504
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"68⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N69⤵PID:2056
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"70⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N71⤵PID:1704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"72⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N73⤵
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"74⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N75⤵PID:1612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"76⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N77⤵
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"78⤵
- System Location Discovery: System Language Discovery
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N79⤵PID:2260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"80⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N81⤵PID:2040
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"82⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N83⤵PID:316
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"84⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N85⤵PID:1676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"86⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N87⤵PID:1740
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"88⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N89⤵
- System Location Discovery: System Language Discovery
PID:684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"90⤵
- System Location Discovery: System Language Discovery
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N91⤵PID:2120
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"92⤵
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N93⤵PID:2832
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"94⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N95⤵PID:1656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"96⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N97⤵PID:2508
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"98⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N99⤵PID:2404
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"100⤵PID:236
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N101⤵PID:2312
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"102⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N103⤵PID:1680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"104⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N105⤵PID:544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"106⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N107⤵PID:2856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"108⤵PID:500
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N109⤵
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"110⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N111⤵PID:2288
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"112⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N113⤵PID:2708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"114⤵
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N115⤵PID:316
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"116⤵
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N117⤵PID:1680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"118⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N119⤵PID:2800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"120⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N121⤵
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"122⤵PID:620
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-