Analysis
-
max time kernel
120s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
561ae02e1e738b522ea1feb1a1475580N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
561ae02e1e738b522ea1feb1a1475580N.exe
Resource
win10v2004-20240802-en
General
-
Target
561ae02e1e738b522ea1feb1a1475580N.exe
-
Size
121KB
-
MD5
561ae02e1e738b522ea1feb1a1475580
-
SHA1
f160c95c205b28dd4512e872f00fd3af0935e429
-
SHA256
25aa906488ecd75d67ecd7a9e620da17cfa341fb1f2ea26e9388c5efeeb7a1bf
-
SHA512
922d137d3bbdd50e869f899bbd3a53194ecef4e0a78b65d30a8d677df9c7e5658bd7eba0ad57f6e1b4180b4656ccf0dfe7786833af5c40d8ccbd35cbd6028352
-
SSDEEP
3072:iFrmfrydPCAewNgSbDSfxEWVHhEE8q8888888888888888888H:SmOhAKjVES/
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (82) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ZuwcccMg.exe -
Executes dropped EXE 2 IoCs
pid Process 4896 ZuwcccMg.exe 4796 OcoskYIM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zccQckwY.exe = "C:\\ProgramData\\yGIoEAQo\\zccQckwY.exe" 561ae02e1e738b522ea1feb1a1475580N.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZuwcccMg.exe = "C:\\Users\\Admin\\zAcgkwsk\\ZuwcccMg.exe" 561ae02e1e738b522ea1feb1a1475580N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OcoskYIM.exe = "C:\\ProgramData\\scQYAIoU\\OcoskYIM.exe" 561ae02e1e738b522ea1feb1a1475580N.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZuwcccMg.exe = "C:\\Users\\Admin\\zAcgkwsk\\ZuwcccMg.exe" ZuwcccMg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OcoskYIM.exe = "C:\\ProgramData\\scQYAIoU\\OcoskYIM.exe" OcoskYIM.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oigIEsUw.exe = "C:\\Users\\Admin\\deskYwIo\\oigIEsUw.exe" 561ae02e1e738b522ea1feb1a1475580N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4720 908 WerFault.exe 1309 2648 1972 WerFault.exe 1310 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZuwcccMg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oigIEsUw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561ae02e1e738b522ea1feb1a1475580N.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1504 reg.exe 3076 reg.exe 1600 reg.exe 3544 reg.exe 908 reg.exe 4924 reg.exe 800 reg.exe 620 reg.exe 5000 reg.exe 4928 reg.exe 5040 reg.exe 2688 reg.exe 4960 reg.exe 1504 reg.exe 2944 reg.exe 4632 reg.exe 840 reg.exe 4036 reg.exe 4832 reg.exe 3760 reg.exe 4852 reg.exe 4996 reg.exe 2824 reg.exe 3952 reg.exe 1852 reg.exe 3452 reg.exe 1488 reg.exe 1412 reg.exe 4636 reg.exe 1088 reg.exe 3952 reg.exe 4924 reg.exe 1952 reg.exe 1312 reg.exe 2916 reg.exe 3700 reg.exe 4608 reg.exe 2016 reg.exe 4332 reg.exe 3948 reg.exe 4744 reg.exe 4656 reg.exe 2016 reg.exe 1988 reg.exe 744 reg.exe 4640 reg.exe 908 reg.exe 4512 reg.exe 3372 reg.exe 1572 reg.exe 2268 reg.exe 2412 reg.exe 4728 reg.exe 3760 reg.exe 4108 reg.exe 3700 reg.exe 3372 reg.exe 4196 reg.exe 1976 reg.exe 1840 reg.exe 4052 reg.exe 4596 reg.exe 3736 reg.exe 908 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4956 561ae02e1e738b522ea1feb1a1475580N.exe 4956 561ae02e1e738b522ea1feb1a1475580N.exe 4956 561ae02e1e738b522ea1feb1a1475580N.exe 4956 561ae02e1e738b522ea1feb1a1475580N.exe 3996 561ae02e1e738b522ea1feb1a1475580N.exe 3996 561ae02e1e738b522ea1feb1a1475580N.exe 3996 561ae02e1e738b522ea1feb1a1475580N.exe 3996 561ae02e1e738b522ea1feb1a1475580N.exe 4024 561ae02e1e738b522ea1feb1a1475580N.exe 4024 561ae02e1e738b522ea1feb1a1475580N.exe 4024 561ae02e1e738b522ea1feb1a1475580N.exe 4024 561ae02e1e738b522ea1feb1a1475580N.exe 5068 561ae02e1e738b522ea1feb1a1475580N.exe 5068 561ae02e1e738b522ea1feb1a1475580N.exe 5068 561ae02e1e738b522ea1feb1a1475580N.exe 5068 561ae02e1e738b522ea1feb1a1475580N.exe 4564 561ae02e1e738b522ea1feb1a1475580N.exe 4564 561ae02e1e738b522ea1feb1a1475580N.exe 4564 561ae02e1e738b522ea1feb1a1475580N.exe 4564 561ae02e1e738b522ea1feb1a1475580N.exe 4176 561ae02e1e738b522ea1feb1a1475580N.exe 4176 561ae02e1e738b522ea1feb1a1475580N.exe 4176 561ae02e1e738b522ea1feb1a1475580N.exe 4176 561ae02e1e738b522ea1feb1a1475580N.exe 2844 561ae02e1e738b522ea1feb1a1475580N.exe 2844 561ae02e1e738b522ea1feb1a1475580N.exe 2844 561ae02e1e738b522ea1feb1a1475580N.exe 2844 561ae02e1e738b522ea1feb1a1475580N.exe 1940 561ae02e1e738b522ea1feb1a1475580N.exe 1940 561ae02e1e738b522ea1feb1a1475580N.exe 1940 561ae02e1e738b522ea1feb1a1475580N.exe 1940 561ae02e1e738b522ea1feb1a1475580N.exe 3888 561ae02e1e738b522ea1feb1a1475580N.exe 3888 561ae02e1e738b522ea1feb1a1475580N.exe 3888 561ae02e1e738b522ea1feb1a1475580N.exe 3888 561ae02e1e738b522ea1feb1a1475580N.exe 2320 561ae02e1e738b522ea1feb1a1475580N.exe 2320 561ae02e1e738b522ea1feb1a1475580N.exe 2320 561ae02e1e738b522ea1feb1a1475580N.exe 2320 561ae02e1e738b522ea1feb1a1475580N.exe 4056 561ae02e1e738b522ea1feb1a1475580N.exe 4056 561ae02e1e738b522ea1feb1a1475580N.exe 4056 561ae02e1e738b522ea1feb1a1475580N.exe 4056 561ae02e1e738b522ea1feb1a1475580N.exe 924 561ae02e1e738b522ea1feb1a1475580N.exe 924 561ae02e1e738b522ea1feb1a1475580N.exe 924 561ae02e1e738b522ea1feb1a1475580N.exe 924 561ae02e1e738b522ea1feb1a1475580N.exe 5080 561ae02e1e738b522ea1feb1a1475580N.exe 5080 561ae02e1e738b522ea1feb1a1475580N.exe 5080 561ae02e1e738b522ea1feb1a1475580N.exe 5080 561ae02e1e738b522ea1feb1a1475580N.exe 3620 561ae02e1e738b522ea1feb1a1475580N.exe 3620 561ae02e1e738b522ea1feb1a1475580N.exe 3620 561ae02e1e738b522ea1feb1a1475580N.exe 3620 561ae02e1e738b522ea1feb1a1475580N.exe 2344 561ae02e1e738b522ea1feb1a1475580N.exe 2344 561ae02e1e738b522ea1feb1a1475580N.exe 2344 561ae02e1e738b522ea1feb1a1475580N.exe 2344 561ae02e1e738b522ea1feb1a1475580N.exe 3468 561ae02e1e738b522ea1feb1a1475580N.exe 3468 561ae02e1e738b522ea1feb1a1475580N.exe 3468 561ae02e1e738b522ea1feb1a1475580N.exe 3468 561ae02e1e738b522ea1feb1a1475580N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4896 ZuwcccMg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe 4896 ZuwcccMg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4956 wrote to memory of 4896 4956 561ae02e1e738b522ea1feb1a1475580N.exe 85 PID 4956 wrote to memory of 4896 4956 561ae02e1e738b522ea1feb1a1475580N.exe 85 PID 4956 wrote to memory of 4896 4956 561ae02e1e738b522ea1feb1a1475580N.exe 85 PID 4956 wrote to memory of 4796 4956 561ae02e1e738b522ea1feb1a1475580N.exe 86 PID 4956 wrote to memory of 4796 4956 561ae02e1e738b522ea1feb1a1475580N.exe 86 PID 4956 wrote to memory of 4796 4956 561ae02e1e738b522ea1feb1a1475580N.exe 86 PID 4956 wrote to memory of 4520 4956 561ae02e1e738b522ea1feb1a1475580N.exe 87 PID 4956 wrote to memory of 4520 4956 561ae02e1e738b522ea1feb1a1475580N.exe 87 PID 4956 wrote to memory of 4520 4956 561ae02e1e738b522ea1feb1a1475580N.exe 87 PID 4956 wrote to memory of 3076 4956 561ae02e1e738b522ea1feb1a1475580N.exe 90 PID 4956 wrote to memory of 3076 4956 561ae02e1e738b522ea1feb1a1475580N.exe 90 PID 4956 wrote to memory of 3076 4956 561ae02e1e738b522ea1feb1a1475580N.exe 90 PID 4956 wrote to memory of 4832 4956 561ae02e1e738b522ea1feb1a1475580N.exe 91 PID 4956 wrote to memory of 4832 4956 561ae02e1e738b522ea1feb1a1475580N.exe 91 PID 4956 wrote to memory of 4832 4956 561ae02e1e738b522ea1feb1a1475580N.exe 91 PID 4956 wrote to memory of 4396 4956 561ae02e1e738b522ea1feb1a1475580N.exe 92 PID 4956 wrote to memory of 4396 4956 561ae02e1e738b522ea1feb1a1475580N.exe 92 PID 4956 wrote to memory of 4396 4956 561ae02e1e738b522ea1feb1a1475580N.exe 92 PID 4956 wrote to memory of 2428 4956 561ae02e1e738b522ea1feb1a1475580N.exe 93 PID 4956 wrote to memory of 2428 4956 561ae02e1e738b522ea1feb1a1475580N.exe 93 PID 4956 wrote to memory of 2428 4956 561ae02e1e738b522ea1feb1a1475580N.exe 93 PID 4520 wrote to memory of 3996 4520 cmd.exe 98 PID 4520 wrote to memory of 3996 4520 cmd.exe 98 PID 4520 wrote to memory of 3996 4520 cmd.exe 98 PID 2428 wrote to memory of 2844 2428 cmd.exe 99 PID 2428 wrote to memory of 2844 2428 cmd.exe 99 PID 2428 wrote to memory of 2844 2428 cmd.exe 99 PID 3996 wrote to memory of 4744 3996 561ae02e1e738b522ea1feb1a1475580N.exe 100 PID 3996 wrote to memory of 4744 3996 561ae02e1e738b522ea1feb1a1475580N.exe 100 PID 3996 wrote to memory of 4744 3996 561ae02e1e738b522ea1feb1a1475580N.exe 100 PID 4744 wrote to memory of 4024 4744 cmd.exe 102 PID 4744 wrote to memory of 4024 4744 cmd.exe 102 PID 4744 wrote to memory of 4024 4744 cmd.exe 102 PID 3996 wrote to memory of 3760 3996 561ae02e1e738b522ea1feb1a1475580N.exe 103 PID 3996 wrote to memory of 3760 3996 561ae02e1e738b522ea1feb1a1475580N.exe 103 PID 3996 wrote to memory of 3760 3996 561ae02e1e738b522ea1feb1a1475580N.exe 103 PID 3996 wrote to memory of 2272 3996 561ae02e1e738b522ea1feb1a1475580N.exe 104 PID 3996 wrote to memory of 2272 3996 561ae02e1e738b522ea1feb1a1475580N.exe 104 PID 3996 wrote to memory of 2272 3996 561ae02e1e738b522ea1feb1a1475580N.exe 104 PID 3996 wrote to memory of 640 3996 561ae02e1e738b522ea1feb1a1475580N.exe 105 PID 3996 wrote to memory of 640 3996 561ae02e1e738b522ea1feb1a1475580N.exe 105 PID 3996 wrote to memory of 640 3996 561ae02e1e738b522ea1feb1a1475580N.exe 105 PID 3996 wrote to memory of 2792 3996 561ae02e1e738b522ea1feb1a1475580N.exe 106 PID 3996 wrote to memory of 2792 3996 561ae02e1e738b522ea1feb1a1475580N.exe 106 PID 3996 wrote to memory of 2792 3996 561ae02e1e738b522ea1feb1a1475580N.exe 106 PID 2792 wrote to memory of 5116 2792 cmd.exe 111 PID 2792 wrote to memory of 5116 2792 cmd.exe 111 PID 2792 wrote to memory of 5116 2792 cmd.exe 111 PID 4024 wrote to memory of 3712 4024 561ae02e1e738b522ea1feb1a1475580N.exe 112 PID 4024 wrote to memory of 3712 4024 561ae02e1e738b522ea1feb1a1475580N.exe 112 PID 4024 wrote to memory of 3712 4024 561ae02e1e738b522ea1feb1a1475580N.exe 112 PID 3712 wrote to memory of 5068 3712 cmd.exe 114 PID 3712 wrote to memory of 5068 3712 cmd.exe 114 PID 3712 wrote to memory of 5068 3712 cmd.exe 114 PID 4024 wrote to memory of 1276 4024 561ae02e1e738b522ea1feb1a1475580N.exe 115 PID 4024 wrote to memory of 1276 4024 561ae02e1e738b522ea1feb1a1475580N.exe 115 PID 4024 wrote to memory of 1276 4024 561ae02e1e738b522ea1feb1a1475580N.exe 115 PID 4024 wrote to memory of 3992 4024 561ae02e1e738b522ea1feb1a1475580N.exe 116 PID 4024 wrote to memory of 3992 4024 561ae02e1e738b522ea1feb1a1475580N.exe 116 PID 4024 wrote to memory of 3992 4024 561ae02e1e738b522ea1feb1a1475580N.exe 116 PID 4024 wrote to memory of 4924 4024 561ae02e1e738b522ea1feb1a1475580N.exe 117 PID 4024 wrote to memory of 4924 4024 561ae02e1e738b522ea1feb1a1475580N.exe 117 PID 4024 wrote to memory of 4924 4024 561ae02e1e738b522ea1feb1a1475580N.exe 117 PID 4024 wrote to memory of 2900 4024 561ae02e1e738b522ea1feb1a1475580N.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exe"C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\zAcgkwsk\ZuwcccMg.exe"C:\Users\Admin\zAcgkwsk\ZuwcccMg.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4896
-
-
C:\ProgramData\scQYAIoU\OcoskYIM.exe"C:\ProgramData\scQYAIoU\OcoskYIM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"2⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"4⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"6⤵
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N7⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"8⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"10⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"12⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"14⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"16⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"18⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"20⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"22⤵
- System Location Discovery: System Language Discovery
PID:324 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N23⤵
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"24⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N25⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"26⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"28⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"30⤵PID:2088
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV131⤵PID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N31⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"32⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N33⤵PID:2412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"34⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N35⤵PID:1224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"36⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N37⤵PID:3888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"38⤵PID:4284
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N39⤵PID:4996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"40⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N41⤵
- System Location Discovery: System Language Discovery
PID:32 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"42⤵PID:5116
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N43⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"44⤵
- System Location Discovery: System Language Discovery
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N45⤵PID:4352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"46⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N47⤵PID:1960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"48⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N49⤵PID:972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"50⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N51⤵PID:4632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"52⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N53⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"54⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N55⤵PID:212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"56⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N57⤵PID:2912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"58⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N59⤵PID:5028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"60⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N61⤵PID:628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"62⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N63⤵PID:4960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"64⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N65⤵PID:1880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"66⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N67⤵PID:4616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"68⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N69⤵PID:4552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"70⤵PID:4372
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N71⤵PID:4436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"72⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N73⤵PID:4032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"74⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N75⤵
- System Location Discovery: System Language Discovery
PID:5008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"76⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N77⤵PID:2796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"78⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N79⤵PID:3104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"80⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N81⤵PID:4380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"82⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N83⤵PID:1724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"84⤵
- System Location Discovery: System Language Discovery
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N85⤵PID:1212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"86⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N87⤵PID:2944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"88⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N89⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"90⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N91⤵PID:684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"92⤵PID:4924
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N93⤵PID:4028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"94⤵
- System Location Discovery: System Language Discovery
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N95⤵PID:4732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"96⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N97⤵PID:3580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"98⤵
- System Location Discovery: System Language Discovery
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N99⤵PID:3952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"100⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N101⤵PID:3868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"102⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N103⤵PID:4316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"104⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N105⤵PID:4388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"106⤵
- System Location Discovery: System Language Discovery
PID:3960 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:3580
-
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N107⤵PID:3660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"108⤵PID:800
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N109⤵PID:2156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"110⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N111⤵PID:32
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"112⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N113⤵
- System Location Discovery: System Language Discovery
PID:3676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"114⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N115⤵PID:4924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"116⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N117⤵PID:3248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"118⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N119⤵PID:4948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"120⤵PID:4232
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N.exeC:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N121⤵PID:3104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\561ae02e1e738b522ea1feb1a1475580N"122⤵PID:4964
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-