Overview
overview
8Static
static
7ac8zt2/di.exe
windows7-x64
5ac8zt2/di.exe
windows10-2004-x64
5ac8zt2/driverpp.sys
windows7-x64
1ac8zt2/driverpp.sys
windows10-2004-x64
1ac8zt2/iedrives.dll
windows7-x64
6ac8zt2/iedrives.dll
windows10-2004-x64
6ac8zt2/install.bat
windows7-x64
5ac8zt2/install.bat
windows10-2004-x64
5ac8zt2/install2.bat
windows7-x64
8ac8zt2/install2.bat
windows10-2004-x64
8ac8zt2/msdrv.exe
windows7-x64
5ac8zt2/msdrv.exe
windows10-2004-x64
5ac8zt2/msdrvctrl.exe
windows7-x64
8ac8zt2/msdrvctrl.exe
windows10-2004-x64
8ac8zt2/start-soft.bat
windows7-x64
1ac8zt2/start-soft.bat
windows10-2004-x64
1Analysis
-
max time kernel
94s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 13:58
Behavioral task
behavioral1
Sample
ac8zt2/di.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ac8zt2/di.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ac8zt2/driverpp.sys
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ac8zt2/driverpp.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
ac8zt2/iedrives.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
ac8zt2/iedrives.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ac8zt2/install.bat
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ac8zt2/install.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
ac8zt2/install2.bat
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ac8zt2/install2.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ac8zt2/msdrv.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ac8zt2/msdrv.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ac8zt2/msdrvctrl.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
ac8zt2/msdrvctrl.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ac8zt2/start-soft.bat
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
ac8zt2/start-soft.bat
Resource
win10v2004-20240910-en
General
-
Target
ac8zt2/msdrv.exe
-
Size
67KB
-
MD5
6d9ec31b17f13479b1dcdeb3a790883e
-
SHA1
1302901cc26a559437a18bc0b9d0f2ba4039fff2
-
SHA256
ebf88afee2655dada60a0dea072e0b803ec5d228ca2c20727b76488c7afbc014
-
SHA512
de35c3dbceafaa75fdefa7182bb434073fe0c4abee734fb8a7c09eba5bfbb0121544975e86916765387f93da60bbef144d2e258ae42e0068272620bcd86202f1
-
SSDEEP
1536:eJgHv2qSN7qqOugDy6WUGLr5bq9n0waMJhU1ITSDi0:eJgHv2qIWe7UGLFWOcfTSDf
Malware Config
Signatures
-
resource yara_rule behavioral12/memory/3580-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4812-2-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4828-3-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/3580-4-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/3736-6-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/1684-10-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/1684-9-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/468-12-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4828-8-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4476-14-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/2716-16-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/2868-13-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4908-18-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4476-21-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/5112-19-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/456-24-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/5112-26-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4148-22-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4148-23-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4152-28-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/456-32-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/3724-30-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4468-34-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/3724-36-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/3632-39-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4632-42-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/556-40-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/2868-37-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/3728-44-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/556-46-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/5028-49-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4892-52-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/2056-50-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/2056-56-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4228-54-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/244-58-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4576-60-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/2780-62-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4420-65-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/232-63-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/2928-67-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4388-68-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/232-70-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4848-72-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/1596-73-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/4388-75-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/3688-77-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/1596-80-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/3656-78-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/1724-82-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/3656-84-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/1016-87-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/116-89-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/1980-86-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/1016-93-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/3556-91-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/3124-90-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/5068-96-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/3556-98-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/1952-95-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/3060-100-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/5068-104-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral12/memory/1444-101-0x0000000000400000-0x000000000042B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3580 msdrv.exe 3580 msdrv.exe 4812 msdrv.exe 4812 msdrv.exe 4828 msdrv.exe 4828 msdrv.exe 4828 msdrv.exe 3736 msdrv.exe 3736 msdrv.exe 468 msdrv.exe 468 msdrv.exe 1684 msdrv.exe 1684 msdrv.exe 2716 msdrv.exe 2716 msdrv.exe 2716 msdrv.exe 2868 msdrv.exe 2868 msdrv.exe 4476 msdrv.exe 4476 msdrv.exe 4476 msdrv.exe 4908 msdrv.exe 4908 msdrv.exe 5112 msdrv.exe 5112 msdrv.exe 5112 msdrv.exe 4148 msdrv.exe 4148 msdrv.exe 456 msdrv.exe 456 msdrv.exe 456 msdrv.exe 4152 msdrv.exe 4152 msdrv.exe 3724 msdrv.exe 3724 msdrv.exe 3724 msdrv.exe 4468 msdrv.exe 4468 msdrv.exe 4632 msdrv.exe 4632 msdrv.exe 4632 msdrv.exe 3632 msdrv.exe 3632 msdrv.exe 556 msdrv.exe 556 msdrv.exe 556 msdrv.exe 3728 msdrv.exe 3728 msdrv.exe 4892 msdrv.exe 4892 msdrv.exe 5028 msdrv.exe 5028 msdrv.exe 2056 msdrv.exe 2056 msdrv.exe 2056 msdrv.exe 4228 msdrv.exe 4228 msdrv.exe 4576 msdrv.exe 4576 msdrv.exe 4576 msdrv.exe 244 msdrv.exe 244 msdrv.exe 4420 msdrv.exe 4420 msdrv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3580 wrote to memory of 4812 3580 msdrv.exe 82 PID 3580 wrote to memory of 4812 3580 msdrv.exe 82 PID 3580 wrote to memory of 4812 3580 msdrv.exe 82 PID 3580 wrote to memory of 4828 3580 msdrv.exe 83 PID 3580 wrote to memory of 4828 3580 msdrv.exe 83 PID 3580 wrote to memory of 4828 3580 msdrv.exe 83 PID 4828 wrote to memory of 3736 4828 msdrv.exe 84 PID 4828 wrote to memory of 3736 4828 msdrv.exe 84 PID 4828 wrote to memory of 3736 4828 msdrv.exe 84 PID 4828 wrote to memory of 468 4828 msdrv.exe 85 PID 4828 wrote to memory of 468 4828 msdrv.exe 85 PID 4828 wrote to memory of 468 4828 msdrv.exe 85 PID 468 wrote to memory of 1684 468 msdrv.exe 86 PID 468 wrote to memory of 1684 468 msdrv.exe 86 PID 468 wrote to memory of 1684 468 msdrv.exe 86 PID 468 wrote to memory of 2716 468 msdrv.exe 87 PID 468 wrote to memory of 2716 468 msdrv.exe 87 PID 468 wrote to memory of 2716 468 msdrv.exe 87 PID 2716 wrote to memory of 2868 2716 msdrv.exe 88 PID 2716 wrote to memory of 2868 2716 msdrv.exe 88 PID 2716 wrote to memory of 2868 2716 msdrv.exe 88 PID 2716 wrote to memory of 4476 2716 msdrv.exe 89 PID 2716 wrote to memory of 4476 2716 msdrv.exe 89 PID 2716 wrote to memory of 4476 2716 msdrv.exe 89 PID 4476 wrote to memory of 4908 4476 msdrv.exe 90 PID 4476 wrote to memory of 4908 4476 msdrv.exe 90 PID 4476 wrote to memory of 4908 4476 msdrv.exe 90 PID 4476 wrote to memory of 5112 4476 msdrv.exe 91 PID 4476 wrote to memory of 5112 4476 msdrv.exe 91 PID 4476 wrote to memory of 5112 4476 msdrv.exe 91 PID 5112 wrote to memory of 4148 5112 msdrv.exe 92 PID 5112 wrote to memory of 4148 5112 msdrv.exe 92 PID 5112 wrote to memory of 4148 5112 msdrv.exe 92 PID 5112 wrote to memory of 456 5112 msdrv.exe 93 PID 5112 wrote to memory of 456 5112 msdrv.exe 93 PID 5112 wrote to memory of 456 5112 msdrv.exe 93 PID 456 wrote to memory of 4152 456 msdrv.exe 94 PID 456 wrote to memory of 4152 456 msdrv.exe 94 PID 456 wrote to memory of 4152 456 msdrv.exe 94 PID 456 wrote to memory of 3724 456 msdrv.exe 95 PID 456 wrote to memory of 3724 456 msdrv.exe 95 PID 456 wrote to memory of 3724 456 msdrv.exe 95 PID 3724 wrote to memory of 4468 3724 msdrv.exe 96 PID 3724 wrote to memory of 4468 3724 msdrv.exe 96 PID 3724 wrote to memory of 4468 3724 msdrv.exe 96 PID 3724 wrote to memory of 4632 3724 msdrv.exe 97 PID 3724 wrote to memory of 4632 3724 msdrv.exe 97 PID 3724 wrote to memory of 4632 3724 msdrv.exe 97 PID 4632 wrote to memory of 3632 4632 msdrv.exe 98 PID 4632 wrote to memory of 3632 4632 msdrv.exe 98 PID 4632 wrote to memory of 3632 4632 msdrv.exe 98 PID 4632 wrote to memory of 556 4632 msdrv.exe 99 PID 4632 wrote to memory of 556 4632 msdrv.exe 99 PID 4632 wrote to memory of 556 4632 msdrv.exe 99 PID 556 wrote to memory of 3728 556 msdrv.exe 100 PID 556 wrote to memory of 3728 556 msdrv.exe 100 PID 556 wrote to memory of 3728 556 msdrv.exe 100 PID 556 wrote to memory of 4892 556 msdrv.exe 101 PID 556 wrote to memory of 4892 556 msdrv.exe 101 PID 556 wrote to memory of 4892 556 msdrv.exe 101 PID 4892 wrote to memory of 5028 4892 msdrv.exe 102 PID 4892 wrote to memory of 5028 4892 msdrv.exe 102 PID 4892 wrote to memory of 5028 4892 msdrv.exe 102 PID 4892 wrote to memory of 2056 4892 msdrv.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"8⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"8⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"10⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"10⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"11⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"11⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"14⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:244
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"14⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"15⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"15⤵
- System Location Discovery: System Language Discovery
PID:232 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"16⤵
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"16⤵
- System Location Discovery: System Language Discovery
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"17⤵
- System Location Discovery: System Language Discovery
PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"17⤵
- System Location Discovery: System Language Discovery
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"18⤵
- System Location Discovery: System Language Discovery
PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"18⤵
- System Location Discovery: System Language Discovery
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"19⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"19⤵
- System Location Discovery: System Language Discovery
PID:116 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"20⤵
- System Location Discovery: System Language Discovery
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"20⤵
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"21⤵
- System Location Discovery: System Language Discovery
PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"21⤵
- System Location Discovery: System Language Discovery
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"22⤵
- System Location Discovery: System Language Discovery
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"22⤵
- System Location Discovery: System Language Discovery
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"23⤵
- System Location Discovery: System Language Discovery
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\ac8zt2\msdrv.exe"23⤵
- System Location Discovery: System Language Discovery
PID:1444
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-