Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 06:42
Static task
static1
Behavioral task
behavioral1
Sample
6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe
-
Size
13.1MB
-
MD5
6a9c6979794cb76418468436863d9c0a
-
SHA1
45827af07a21ad6ce9625e229e2b99f6c81f9a39
-
SHA256
7d5d3ada6092553b21d75c4fe407a4692c63bd0548cb9d0a1675de61f1946c9c
-
SHA512
58475f6c34bf8252f823ee234a3950c5e89f2dac29697578643d3de8f9fdb47b1528bbf71b9280855ee279d385fde7e5d0522339830f67dd9814fb6f4082d681
-
SSDEEP
49152:ArilWvdYEbdDYCJ6TRBsDL9A9TK4FfpV3203HCnBTaXMdYrkTcH:AriSkBcF4Fhl2gUBTaXMmrg
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 4120 Builder.exe 1532 avguix.exe 5112 avguix.exe 1564 avguix.exe 2236 avguix.exe 1136 avguix.exe 2824 avguix.exe 768 avguix.exe 916 avguix.exe 820 avguix.exe 4624 avguix.exe 4884 avguix.exe 808 avguix.exe 1120 avguix.exe 1420 avguix.exe 5056 avguix.exe 2940 avguix.exe 2344 avguix.exe 4896 avguix.exe 3244 avguix.exe 3876 avguix.exe 4440 avguix.exe 4064 avguix.exe 1972 avguix.exe 1132 avguix.exe 4912 avguix.exe 3140 avguix.exe 224 avguix.exe 3720 avguix.exe 540 avguix.exe 2604 avguix.exe 2924 avguix.exe 4480 avguix.exe 2000 avguix.exe 4908 avguix.exe 2192 avguix.exe 4344 avguix.exe 332 avguix.exe 4584 avguix.exe 4336 avguix.exe 4944 avguix.exe 4476 avguix.exe 1800 avguix.exe 3972 avguix.exe 2604 avguix.exe 1376 avguix.exe 1744 avguix.exe 4128 avguix.exe 4388 avguix.exe 5032 avguix.exe 4604 avguix.exe 880 avguix.exe 2084 avguix.exe 2192 avguix.exe 5092 avguix.exe 1244 avguix.exe 3852 avguix.exe 916 avguix.exe 4468 avguix.exe 4380 avguix.exe 4640 avguix.exe 2408 avguix.exe 4924 avguix.exe 1580 avguix.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVG Internet Security = "C:\\Users\\Admin\\AppData\\Local\\avguix.exe" 6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Builder Security = "C:\\Users\\Admin\\AppData\\Local\\Builder.exe" Builder.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\windows\SysWOW64\OikB3A2AF7A.sys 6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe File created C:\windows\SysWOW64\OikxB3A2AF7A.sys 6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avguix.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe 4120 Builder.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3484 6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3484 6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe 1532 avguix.exe 5112 avguix.exe 1564 avguix.exe 2236 avguix.exe 1136 avguix.exe 2824 avguix.exe 768 avguix.exe 916 avguix.exe 820 avguix.exe 4624 avguix.exe 4884 avguix.exe 808 avguix.exe 1120 avguix.exe 1420 avguix.exe 5056 avguix.exe 2940 avguix.exe 2344 avguix.exe 4896 avguix.exe 3244 avguix.exe 3876 avguix.exe 4440 avguix.exe 4064 avguix.exe 1972 avguix.exe 1132 avguix.exe 4912 avguix.exe 3140 avguix.exe 224 avguix.exe 3720 avguix.exe 540 avguix.exe 2604 avguix.exe 2924 avguix.exe 4480 avguix.exe 2000 avguix.exe 4908 avguix.exe 2192 avguix.exe 4344 avguix.exe 332 avguix.exe 4584 avguix.exe 4336 avguix.exe 4944 avguix.exe 4476 avguix.exe 1800 avguix.exe 3972 avguix.exe 2604 avguix.exe 1376 avguix.exe 1744 avguix.exe 4128 avguix.exe 4388 avguix.exe 5032 avguix.exe 4604 avguix.exe 880 avguix.exe 2084 avguix.exe 2192 avguix.exe 5092 avguix.exe 1244 avguix.exe 3852 avguix.exe 916 avguix.exe 4468 avguix.exe 4380 avguix.exe 4640 avguix.exe 2408 avguix.exe 4924 avguix.exe 1580 avguix.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3484 wrote to memory of 4120 3484 6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe 89 PID 3484 wrote to memory of 4120 3484 6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe 89 PID 3484 wrote to memory of 4120 3484 6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe 89 PID 4120 wrote to memory of 1532 4120 Builder.exe 90 PID 4120 wrote to memory of 1532 4120 Builder.exe 90 PID 4120 wrote to memory of 1532 4120 Builder.exe 90 PID 4120 wrote to memory of 5112 4120 Builder.exe 91 PID 4120 wrote to memory of 5112 4120 Builder.exe 91 PID 4120 wrote to memory of 5112 4120 Builder.exe 91 PID 4120 wrote to memory of 1564 4120 Builder.exe 92 PID 4120 wrote to memory of 1564 4120 Builder.exe 92 PID 4120 wrote to memory of 1564 4120 Builder.exe 92 PID 4120 wrote to memory of 2236 4120 Builder.exe 93 PID 4120 wrote to memory of 2236 4120 Builder.exe 93 PID 4120 wrote to memory of 2236 4120 Builder.exe 93 PID 4120 wrote to memory of 1136 4120 Builder.exe 96 PID 4120 wrote to memory of 1136 4120 Builder.exe 96 PID 4120 wrote to memory of 1136 4120 Builder.exe 96 PID 4120 wrote to memory of 2824 4120 Builder.exe 99 PID 4120 wrote to memory of 2824 4120 Builder.exe 99 PID 4120 wrote to memory of 2824 4120 Builder.exe 99 PID 4120 wrote to memory of 768 4120 Builder.exe 100 PID 4120 wrote to memory of 768 4120 Builder.exe 100 PID 4120 wrote to memory of 768 4120 Builder.exe 100 PID 4120 wrote to memory of 916 4120 Builder.exe 101 PID 4120 wrote to memory of 916 4120 Builder.exe 101 PID 4120 wrote to memory of 916 4120 Builder.exe 101 PID 4120 wrote to memory of 820 4120 Builder.exe 103 PID 4120 wrote to memory of 820 4120 Builder.exe 103 PID 4120 wrote to memory of 820 4120 Builder.exe 103 PID 4120 wrote to memory of 4624 4120 Builder.exe 104 PID 4120 wrote to memory of 4624 4120 Builder.exe 104 PID 4120 wrote to memory of 4624 4120 Builder.exe 104 PID 4120 wrote to memory of 4884 4120 Builder.exe 105 PID 4120 wrote to memory of 4884 4120 Builder.exe 105 PID 4120 wrote to memory of 4884 4120 Builder.exe 105 PID 4120 wrote to memory of 808 4120 Builder.exe 108 PID 4120 wrote to memory of 808 4120 Builder.exe 108 PID 4120 wrote to memory of 808 4120 Builder.exe 108 PID 4120 wrote to memory of 1120 4120 Builder.exe 109 PID 4120 wrote to memory of 1120 4120 Builder.exe 109 PID 4120 wrote to memory of 1120 4120 Builder.exe 109 PID 4120 wrote to memory of 1420 4120 Builder.exe 110 PID 4120 wrote to memory of 1420 4120 Builder.exe 110 PID 4120 wrote to memory of 1420 4120 Builder.exe 110 PID 4120 wrote to memory of 5056 4120 Builder.exe 111 PID 4120 wrote to memory of 5056 4120 Builder.exe 111 PID 4120 wrote to memory of 5056 4120 Builder.exe 111 PID 4120 wrote to memory of 2940 4120 Builder.exe 112 PID 4120 wrote to memory of 2940 4120 Builder.exe 112 PID 4120 wrote to memory of 2940 4120 Builder.exe 112 PID 4120 wrote to memory of 2344 4120 Builder.exe 113 PID 4120 wrote to memory of 2344 4120 Builder.exe 113 PID 4120 wrote to memory of 2344 4120 Builder.exe 113 PID 4120 wrote to memory of 4896 4120 Builder.exe 114 PID 4120 wrote to memory of 4896 4120 Builder.exe 114 PID 4120 wrote to memory of 4896 4120 Builder.exe 114 PID 4120 wrote to memory of 3244 4120 Builder.exe 115 PID 4120 wrote to memory of 3244 4120 Builder.exe 115 PID 4120 wrote to memory of 3244 4120 Builder.exe 115 PID 4120 wrote to memory of 3876 4120 Builder.exe 116 PID 4120 wrote to memory of 3876 4120 Builder.exe 116 PID 4120 wrote to memory of 3876 4120 Builder.exe 116 PID 4120 wrote to memory of 4440 4120 Builder.exe 117 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6a9c6979794cb76418468436863d9c0a_JaffaCakes118.exe"1⤵
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3484 -
C:\Users\Admin\AppData\Local\Builder.exeC:\Users\Admin\AppData\Local\Builder.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5112
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2236
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1136
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:768
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:916
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:820
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4624
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4884
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:808
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1120
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1420
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5056
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2344
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4896
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3244
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3876
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4440
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4064
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1132
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4912
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3140
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:224
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3720
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:540
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2924
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4480
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4908
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2192
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4344
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:332
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4584
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4336
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4944
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4476
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1800
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3972
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1376
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4128
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4388
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5032
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4604
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:880
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2084
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2192
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5092
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1244
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3852
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:916
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4468
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4380
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4640
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2408
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4924
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:1708
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:4076
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:4868
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:4008
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:1412
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:4444
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:3028
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:868
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:3228
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:4028
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:2524
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:1812
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:4436
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:4448
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:4636
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:2696
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:4020
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:2096
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:4204
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:4708
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:1564
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:5008
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:4928
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:3544
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:720
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:5112
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:5004
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:3628
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:4972
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:5052
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:1232
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:1204
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:3144
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:3856
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:4148
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:3256
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:4060
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:1212
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:1836
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:440
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:3496
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:5016
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:1520
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:332
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:220
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:2940
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:1708
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:4916
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:4008
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:1412
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:2128
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:3536
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:3436
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:3764
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:3724
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:4404
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:3508
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:3788
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:1728
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:436
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:228
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:1552
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:3440
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:408
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:4376
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:4056
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:1912
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:2732
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:4032
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:3924
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:4860
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:4928
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:3544
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:2000
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:2864
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:1268
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵PID:2008
-
-
C:\Users\Admin\AppData\Local\avguix.exeC:\Users\Admin\AppData\Local\avguix.exe3⤵
- System Location Discovery: System Language Discovery
PID:1604
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD55e31e7bf5871b8698ab9ab744ee06470
SHA189ff5acbd648f081b44ad80a5979dcb3f20c803a
SHA25693c706af57ea44405ebfcc7beea6ac47836224938b363cbc3148fd3f20604f96
SHA512653d01db57feb647898ee15d09f55e8efffcab0c3f29a12a0d50782d0ad87bf0a4503037b0a497681e26e9bd2ed50ffe10ab9529eca8b7db4f610165f842ce63
-
Filesize
13.1MB
MD56a9c6979794cb76418468436863d9c0a
SHA145827af07a21ad6ce9625e229e2b99f6c81f9a39
SHA2567d5d3ada6092553b21d75c4fe407a4692c63bd0548cb9d0a1675de61f1946c9c
SHA51258475f6c34bf8252f823ee234a3950c5e89f2dac29697578643d3de8f9fdb47b1528bbf71b9280855ee279d385fde7e5d0522339830f67dd9814fb6f4082d681