Analysis
-
max time kernel
11s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
05845e3aad95b09a777b9285e7bb9d60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
05845e3aad95b09a777b9285e7bb9d60N.exe
Resource
win10v2004-20240730-en
General
-
Target
05845e3aad95b09a777b9285e7bb9d60N.exe
-
Size
693KB
-
MD5
05845e3aad95b09a777b9285e7bb9d60
-
SHA1
648cb8c7eaf98e9c507e08656cb78cbd78c982dc
-
SHA256
72efca1e53608a331a71ed39dd28e6955708a4e9a7cbd72d6bb116a19d6864eb
-
SHA512
883e79f829bd27fb3ecf48cf6bf42f1f1aad0755085e38d5e75d8c84d586330fe1bb5ff7c2c83786a0a65293f2f1c8e48bd7dd22d2668d97d97344d2f01e6b84
-
SSDEEP
12288:dXCNi9B/NqSJIwuZ4CVMPfG6VZSeNbn3Zwa3XAeTSh4yu4Nenne6iqVoScPJeD:oWm4tPfG6x3weL4Nee67iu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Control Panel\International\Geo\Nation 05845e3aad95b09a777b9285e7bb9d60N.exe Key value queried \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Control Panel\International\Geo\Nation 05845e3aad95b09a777b9285e7bb9d60N.exe Key value queried \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Control Panel\International\Geo\Nation 05845e3aad95b09a777b9285e7bb9d60N.exe Key value queried \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Control Panel\International\Geo\Nation 05845e3aad95b09a777b9285e7bb9d60N.exe Key value queried \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Control Panel\International\Geo\Nation 05845e3aad95b09a777b9285e7bb9d60N.exe Key value queried \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Control Panel\International\Geo\Nation 05845e3aad95b09a777b9285e7bb9d60N.exe Key value queried \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Control Panel\International\Geo\Nation 05845e3aad95b09a777b9285e7bb9d60N.exe Key value queried \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Control Panel\International\Geo\Nation 05845e3aad95b09a777b9285e7bb9d60N.exe Key value queried \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Control Panel\International\Geo\Nation 05845e3aad95b09a777b9285e7bb9d60N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 05845e3aad95b09a777b9285e7bb9d60N.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\E: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\J: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\M: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\P: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\U: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\V: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\B: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\H: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\L: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\N: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\O: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\Q: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\T: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\I: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\K: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\R: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\X: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\G: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\S: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\W: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\Y: 05845e3aad95b09a777b9285e7bb9d60N.exe File opened (read-only) \??\Z: 05845e3aad95b09a777b9285e7bb9d60N.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\fucking uncut wifey .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\american cumshot horse lesbian balls .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\SysWOW64\config\systemprofile\japanese nude beast licking wifey .mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\System32\DriverStore\Temp\american nude hardcore girls cock leather .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\SysWOW64\IME\SHARED\indian cumshot fucking sleeping hotel .mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\gay uncut feet (Kathrin,Samantha).avi.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\SysWOW64\FxsTmp\italian handjob fucking hidden feet circumcision (Sarah).zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\SysWOW64\IME\SHARED\gay voyeur titts swallow (Sylvia).zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\SysWOW64\FxsTmp\action trambling big hotel (Gina,Liz).mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\american porn bukkake [free] (Sylvia).mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\danish handjob lingerie girls cock black hairunshaved (Sylvia).mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\SysWOW64\config\systemprofile\fucking big beautyfull (Anniston,Janette).rar.exe 05845e3aad95b09a777b9285e7bb9d60N.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Update\Download\xxx big gorgeoushorny .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files\dotnet\shared\hardcore girls redhair (Kathrin,Samantha).mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files\Microsoft Office\root\Templates\bukkake sleeping glans (Sandy,Sylvia).mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files\Microsoft Office\Updates\Download\horse masturbation .mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\brasilian handjob lingerie sleeping bondage .mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\russian horse lesbian lesbian .mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files (x86)\Google\Temp\xxx [milf] hole .mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\black kicking lingerie big blondie .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\italian horse beast voyeur .rar.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\japanese porn beast [free] cock beautyfull .mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\asian sperm big castration .avi.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\brasilian fetish lingerie [bangbus] black hairunshaved .rar.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files\Common Files\microsoft shared\trambling full movie hole girly .rar.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\horse several models feet (Christine,Sylvia).avi.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\indian handjob hardcore [free] (Sylvia).mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\indian action hardcore big .mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\japanese fetish blowjob hot (!) ejaculation .mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\american porn trambling [milf] hole shower .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\french fucking catfight titts granny (Liz).zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_211cf1c632a13851\handjob xxx catfight (Curtney).zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\canadian horse uncut (Jade).zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\horse lingerie sleeping titts leather (Jade).rar.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\russian animal hardcore [bangbus] (Melissa).mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\blowjob catfight ash (Britney,Melissa).rar.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\japanese horse xxx girls .rar.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\mssrv.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\Downloaded Program Files\hardcore [free] wifey .avi.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\fucking lesbian boots .avi.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\japanese animal trambling catfight girly (Jenna,Karin).mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\british gay full movie .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\indian handjob fucking lesbian pregnant .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\japanese horse blowjob voyeur sweet .avi.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\danish beastiality horse [milf] glans .rar.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\indian beastiality lingerie masturbation ash .mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\african xxx full movie titts .mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\assembly\tmp\gay voyeur .avi.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\fucking several models young .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\swedish gang bang bukkake sleeping (Sarah).zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\blowjob [bangbus] mature .rar.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\british blowjob catfight .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\chinese bukkake licking femdom .mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\british gay sleeping traffic .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\spanish lesbian lesbian penetration (Kathrin,Karin).zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\american handjob bukkake full movie cock .mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\gay girls ¼ë .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\CbsTemp\gay uncut hole girly .mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\InputMethod\SHARED\black fetish trambling uncut castration .rar.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\security\templates\lingerie hot (!) glans .mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\african gay [free] .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\canadian lesbian [bangbus] young .mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\PLA\Templates\indian beastiality bukkake public .rar.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\SoftwareDistribution\Download\bukkake uncut titts swallow (Jade).avi.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\malaysia fucking girls (Curtney).zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\norwegian hardcore big titts fishy (Karin).zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\tyrkish animal sperm girls (Sylvia).rar.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\brasilian nude beast sleeping 50+ (Christine,Sarah).zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\asian lesbian girls swallow .mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\japanese fetish beast [milf] 40+ .mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\japanese horse blowjob hot (!) mistress .mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\african beast [free] .mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\black gang bang sperm voyeur hole blondie (Tatjana).avi.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\spanish horse full movie glans 50+ .avi.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\spanish trambling big boots (Sandy,Sylvia).zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\british hardcore full movie (Sylvia).mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..se-shared-datafiles_31bf3856ad364e35_10.0.19041.1_none_2f5f00d280dce9f6\porn beast [bangbus] (Tatjana).zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\japanese cum lesbian full movie cock ejaculation .mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\lingerie sleeping (Sylvia).zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\american kicking sperm voyeur lady .rar.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\indian cumshot fucking licking mistress .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\american horse horse [bangbus] hole .mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\brasilian fetish xxx girls cock wifey (Tatjana).mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\chinese gay lesbian redhair (Jenna,Liz).zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\assembly\temp\fucking lesbian lady .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\lesbian girls black hairunshaved .rar.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\norwegian bukkake lesbian cock YEâPSè& .avi.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\blowjob catfight blondie .mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\kicking bukkake sleeping .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\xxx girls bedroom .mpg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\swedish cum hardcore licking sm .zip.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\spanish trambling lesbian feet .mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\russian beastiality sperm licking hole femdom (Curtney).mpeg.exe 05845e3aad95b09a777b9285e7bb9d60N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05845e3aad95b09a777b9285e7bb9d60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05845e3aad95b09a777b9285e7bb9d60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05845e3aad95b09a777b9285e7bb9d60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05845e3aad95b09a777b9285e7bb9d60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05845e3aad95b09a777b9285e7bb9d60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05845e3aad95b09a777b9285e7bb9d60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05845e3aad95b09a777b9285e7bb9d60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05845e3aad95b09a777b9285e7bb9d60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05845e3aad95b09a777b9285e7bb9d60N.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 264 05845e3aad95b09a777b9285e7bb9d60N.exe 264 05845e3aad95b09a777b9285e7bb9d60N.exe 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 264 05845e3aad95b09a777b9285e7bb9d60N.exe 264 05845e3aad95b09a777b9285e7bb9d60N.exe 2756 05845e3aad95b09a777b9285e7bb9d60N.exe 2756 05845e3aad95b09a777b9285e7bb9d60N.exe 3592 05845e3aad95b09a777b9285e7bb9d60N.exe 3592 05845e3aad95b09a777b9285e7bb9d60N.exe 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 264 05845e3aad95b09a777b9285e7bb9d60N.exe 264 05845e3aad95b09a777b9285e7bb9d60N.exe 3352 05845e3aad95b09a777b9285e7bb9d60N.exe 3352 05845e3aad95b09a777b9285e7bb9d60N.exe 2884 05845e3aad95b09a777b9285e7bb9d60N.exe 2884 05845e3aad95b09a777b9285e7bb9d60N.exe 2760 05845e3aad95b09a777b9285e7bb9d60N.exe 2760 05845e3aad95b09a777b9285e7bb9d60N.exe 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 2756 05845e3aad95b09a777b9285e7bb9d60N.exe 2756 05845e3aad95b09a777b9285e7bb9d60N.exe 3640 05845e3aad95b09a777b9285e7bb9d60N.exe 3640 05845e3aad95b09a777b9285e7bb9d60N.exe 264 05845e3aad95b09a777b9285e7bb9d60N.exe 264 05845e3aad95b09a777b9285e7bb9d60N.exe 3592 05845e3aad95b09a777b9285e7bb9d60N.exe 3592 05845e3aad95b09a777b9285e7bb9d60N.exe 2772 05845e3aad95b09a777b9285e7bb9d60N.exe 2772 05845e3aad95b09a777b9285e7bb9d60N.exe 2756 05845e3aad95b09a777b9285e7bb9d60N.exe 2756 05845e3aad95b09a777b9285e7bb9d60N.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 264 wrote to memory of 2976 264 05845e3aad95b09a777b9285e7bb9d60N.exe 86 PID 264 wrote to memory of 2976 264 05845e3aad95b09a777b9285e7bb9d60N.exe 86 PID 264 wrote to memory of 2976 264 05845e3aad95b09a777b9285e7bb9d60N.exe 86 PID 2976 wrote to memory of 2756 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 87 PID 2976 wrote to memory of 2756 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 87 PID 2976 wrote to memory of 2756 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 87 PID 264 wrote to memory of 3592 264 05845e3aad95b09a777b9285e7bb9d60N.exe 88 PID 264 wrote to memory of 3592 264 05845e3aad95b09a777b9285e7bb9d60N.exe 88 PID 264 wrote to memory of 3592 264 05845e3aad95b09a777b9285e7bb9d60N.exe 88 PID 2976 wrote to memory of 3352 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 89 PID 2976 wrote to memory of 3352 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 89 PID 2976 wrote to memory of 3352 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 89 PID 2756 wrote to memory of 2884 2756 05845e3aad95b09a777b9285e7bb9d60N.exe 90 PID 2756 wrote to memory of 2884 2756 05845e3aad95b09a777b9285e7bb9d60N.exe 90 PID 2756 wrote to memory of 2884 2756 05845e3aad95b09a777b9285e7bb9d60N.exe 90 PID 264 wrote to memory of 2760 264 05845e3aad95b09a777b9285e7bb9d60N.exe 91 PID 264 wrote to memory of 2760 264 05845e3aad95b09a777b9285e7bb9d60N.exe 91 PID 264 wrote to memory of 2760 264 05845e3aad95b09a777b9285e7bb9d60N.exe 91 PID 3592 wrote to memory of 3640 3592 05845e3aad95b09a777b9285e7bb9d60N.exe 92 PID 3592 wrote to memory of 3640 3592 05845e3aad95b09a777b9285e7bb9d60N.exe 92 PID 3592 wrote to memory of 3640 3592 05845e3aad95b09a777b9285e7bb9d60N.exe 92 PID 2756 wrote to memory of 2772 2756 05845e3aad95b09a777b9285e7bb9d60N.exe 93 PID 2756 wrote to memory of 2772 2756 05845e3aad95b09a777b9285e7bb9d60N.exe 93 PID 2756 wrote to memory of 2772 2756 05845e3aad95b09a777b9285e7bb9d60N.exe 93 PID 2976 wrote to memory of 4476 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 94 PID 2976 wrote to memory of 4476 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 94 PID 2976 wrote to memory of 4476 2976 05845e3aad95b09a777b9285e7bb9d60N.exe 94 PID 3592 wrote to memory of 3408 3592 05845e3aad95b09a777b9285e7bb9d60N.exe 95 PID 3592 wrote to memory of 3408 3592 05845e3aad95b09a777b9285e7bb9d60N.exe 95 PID 3592 wrote to memory of 3408 3592 05845e3aad95b09a777b9285e7bb9d60N.exe 95 PID 3352 wrote to memory of 1212 3352 05845e3aad95b09a777b9285e7bb9d60N.exe 96 PID 3352 wrote to memory of 1212 3352 05845e3aad95b09a777b9285e7bb9d60N.exe 96 PID 3352 wrote to memory of 1212 3352 05845e3aad95b09a777b9285e7bb9d60N.exe 96 PID 264 wrote to memory of 3800 264 05845e3aad95b09a777b9285e7bb9d60N.exe 97 PID 264 wrote to memory of 3800 264 05845e3aad95b09a777b9285e7bb9d60N.exe 97 PID 264 wrote to memory of 3800 264 05845e3aad95b09a777b9285e7bb9d60N.exe 97 PID 2884 wrote to memory of 4504 2884 05845e3aad95b09a777b9285e7bb9d60N.exe 98 PID 2884 wrote to memory of 4504 2884 05845e3aad95b09a777b9285e7bb9d60N.exe 98 PID 2884 wrote to memory of 4504 2884 05845e3aad95b09a777b9285e7bb9d60N.exe 98 PID 2760 wrote to memory of 4576 2760 05845e3aad95b09a777b9285e7bb9d60N.exe 99 PID 2760 wrote to memory of 4576 2760 05845e3aad95b09a777b9285e7bb9d60N.exe 99 PID 2760 wrote to memory of 4576 2760 05845e3aad95b09a777b9285e7bb9d60N.exe 99 PID 3640 wrote to memory of 4812 3640 05845e3aad95b09a777b9285e7bb9d60N.exe 100 PID 3640 wrote to memory of 4812 3640 05845e3aad95b09a777b9285e7bb9d60N.exe 100 PID 3640 wrote to memory of 4812 3640 05845e3aad95b09a777b9285e7bb9d60N.exe 100 PID 2772 wrote to memory of 3012 2772 05845e3aad95b09a777b9285e7bb9d60N.exe 101 PID 2772 wrote to memory of 3012 2772 05845e3aad95b09a777b9285e7bb9d60N.exe 101 PID 2772 wrote to memory of 3012 2772 05845e3aad95b09a777b9285e7bb9d60N.exe 101 PID 2756 wrote to memory of 2784 2756 05845e3aad95b09a777b9285e7bb9d60N.exe 102 PID 2756 wrote to memory of 2784 2756 05845e3aad95b09a777b9285e7bb9d60N.exe 102 PID 2756 wrote to memory of 2784 2756 05845e3aad95b09a777b9285e7bb9d60N.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"7⤵PID:5956
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"8⤵PID:10064
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"7⤵PID:7724
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"7⤵PID:10356
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:5452
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"7⤵PID:9316
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:7272
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:9944
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:5844
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"7⤵PID:10056
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:7504
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:10228
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:9868
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:6600
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:8792
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"7⤵PID:6680
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"8⤵PID:12504
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"7⤵PID:9032
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:6276
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"7⤵PID:2452
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:8464
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:11300
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:6400
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"7⤵PID:9004
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:8756
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:5588
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:8528
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:8180
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:10956
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:6724
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:9308
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:6152
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:11728
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:8332
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:10532
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:6348
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:11372
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:8592
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:12024
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:5928
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:11252
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:8188
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:10948
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"7⤵PID:8120
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:7744
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:10336
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:5296
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:8492
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:10748
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:6920
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:9472
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:5600
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:9416
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:7280
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:9956
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:7372
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:10092
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:6572
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:8768
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:6128
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:10984
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:8088
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:10920
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:5444
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:8668
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:12512
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:7228
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:9920
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:5336
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:8396
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:10752
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:7104
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:9648
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:6500
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:12460
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:8748
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:5660
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:11384
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:7432
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:11136
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:6084
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"7⤵PID:11260
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:7896
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:10724
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:5736
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:9876
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:7448
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:9376
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:5916
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:10080
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:7840
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:10784
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:5288
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:8016
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:10772
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:6832
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:9072
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:5856
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:8812
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:7516
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:10208
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:7412
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:9380
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:6632
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:12560
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:9024
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:5776
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:10044
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:7524
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:9572
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:6948
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:9464
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:6368
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:11084
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:8720
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:12536
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:6016
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"6⤵PID:10584
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:7816
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:10816
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:8600
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:12120
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:6968
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:9500
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:5992
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:10072
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:7760
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:10572
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:7612
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:10344
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:6652
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:12524
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:9040
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"2⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:5964
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"5⤵PID:10236
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:7904
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:10808
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:5368
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:7192
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:11052
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:6976
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:9520
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"2⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:5684
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:9508
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:7492
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:10280
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"2⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:6640
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"4⤵PID:12592
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:9052
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"2⤵PID:6388
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"3⤵PID:12076
-
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"2⤵PID:8688
-
-
C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"C:\Users\Admin\AppData\Local\Temp\05845e3aad95b09a777b9285e7bb9d60N.exe"2⤵PID:12584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\horse several models feet (Christine,Sylvia).avi.exe
Filesize1.8MB
MD532897cba386f1a367b2ee46b12c3fd5a
SHA193752f825f93a2644a63c19b927730bacc066b8a
SHA2568ed85ad437dcd95e945ac8d609156e98b9c9d80221cf6794379541322d91a555
SHA512704b8b47ffb1bc5d598967a01754bf41b6dd1810be9b1f847f6de1e148daa21d6a3e86ac1f9476e199d16f7371602e99a4cf5f126b295738cc16f71176784a7b