Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 14:45
Static task
static1
Behavioral task
behavioral1
Sample
Rgh99876k7e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Rgh99876k7e.exe
Resource
win10v2004-20240802-en
General
-
Target
Rgh99876k7e.exe
-
Size
1.5MB
-
MD5
bd6420aaf066a5b4533598417866bc67
-
SHA1
cf56376da61f4f34034fa4cc525e708052a5ecd3
-
SHA256
b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48
-
SHA512
d9b394fc25949d552b64061810cd4452d24ee473c5755bada25b1db5ad35652a57b545c53c5e1dea88feac376b86e838a6b87886e9ad50e1f582eb2b985cda78
-
SSDEEP
24576:zqDEvCTbMWu7rQYlBQcBiT6rprG8auS2rwF3q65FE8wvsO5BaH3:zTvC/MTQYxsWR7auSY65G8wDKH
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\antholite.vbs antholite.exe -
Executes dropped EXE 64 IoCs
pid Process 2188 antholite.exe 2616 antholite.exe 2608 antholite.exe 2660 antholite.exe 2556 antholite.exe 2364 antholite.exe 520 antholite.exe 1088 antholite.exe 2876 antholite.exe 840 antholite.exe 1976 antholite.exe 1952 antholite.exe 632 antholite.exe 1652 antholite.exe 2160 antholite.exe 2180 antholite.exe 1512 antholite.exe 1620 antholite.exe 2192 antholite.exe 464 antholite.exe 956 antholite.exe 1824 antholite.exe 2416 antholite.exe 2072 antholite.exe 1228 antholite.exe 1576 antholite.exe 2676 antholite.exe 2780 antholite.exe 2600 antholite.exe 2684 antholite.exe 2656 antholite.exe 2524 antholite.exe 2568 antholite.exe 768 antholite.exe 572 antholite.exe 2864 antholite.exe 1104 antholite.exe 860 antholite.exe 2252 antholite.exe 2748 antholite.exe 1848 antholite.exe 2116 antholite.exe 2468 antholite.exe 1420 antholite.exe 1224 antholite.exe 1552 antholite.exe 1708 antholite.exe 2904 antholite.exe 1832 antholite.exe 2296 antholite.exe 2260 antholite.exe 3044 antholite.exe 2768 antholite.exe 2240 antholite.exe 2984 antholite.exe 2548 antholite.exe 2996 antholite.exe 580 antholite.exe 1656 antholite.exe 472 antholite.exe 1740 antholite.exe 1272 antholite.exe 1820 antholite.exe 1532 antholite.exe -
Loads dropped DLL 1 IoCs
pid Process 1120 Rgh99876k7e.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000014f7b-12.dat autoit_exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rgh99876k7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1120 Rgh99876k7e.exe 1120 Rgh99876k7e.exe 2188 antholite.exe 2188 antholite.exe 2616 antholite.exe 2616 antholite.exe 2608 antholite.exe 2608 antholite.exe 2660 antholite.exe 2660 antholite.exe 2556 antholite.exe 2556 antholite.exe 2364 antholite.exe 2364 antholite.exe 520 antholite.exe 520 antholite.exe 1088 antholite.exe 1088 antholite.exe 2876 antholite.exe 2876 antholite.exe 840 antholite.exe 840 antholite.exe 1976 antholite.exe 1976 antholite.exe 1952 antholite.exe 1952 antholite.exe 632 antholite.exe 632 antholite.exe 1652 antholite.exe 1652 antholite.exe 2160 antholite.exe 2160 antholite.exe 2180 antholite.exe 2180 antholite.exe 1512 antholite.exe 1512 antholite.exe 1620 antholite.exe 1620 antholite.exe 2192 antholite.exe 2192 antholite.exe 464 antholite.exe 464 antholite.exe 956 antholite.exe 956 antholite.exe 1824 antholite.exe 1824 antholite.exe 2416 antholite.exe 2416 antholite.exe 2072 antholite.exe 2072 antholite.exe 1576 antholite.exe 1576 antholite.exe 2676 antholite.exe 2676 antholite.exe 2780 antholite.exe 2780 antholite.exe 2600 antholite.exe 2600 antholite.exe 2684 antholite.exe 2684 antholite.exe 2656 antholite.exe 2656 antholite.exe 2524 antholite.exe 2524 antholite.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1120 Rgh99876k7e.exe 1120 Rgh99876k7e.exe 2188 antholite.exe 2188 antholite.exe 2616 antholite.exe 2616 antholite.exe 2608 antholite.exe 2608 antholite.exe 2660 antholite.exe 2660 antholite.exe 2556 antholite.exe 2556 antholite.exe 2364 antholite.exe 2364 antholite.exe 520 antholite.exe 520 antholite.exe 1088 antholite.exe 1088 antholite.exe 2876 antholite.exe 2876 antholite.exe 840 antholite.exe 840 antholite.exe 1976 antholite.exe 1976 antholite.exe 1952 antholite.exe 1952 antholite.exe 632 antholite.exe 632 antholite.exe 1652 antholite.exe 1652 antholite.exe 2160 antholite.exe 2160 antholite.exe 2180 antholite.exe 2180 antholite.exe 1512 antholite.exe 1512 antholite.exe 1620 antholite.exe 1620 antholite.exe 2192 antholite.exe 2192 antholite.exe 464 antholite.exe 464 antholite.exe 956 antholite.exe 956 antholite.exe 1824 antholite.exe 1824 antholite.exe 2416 antholite.exe 2416 antholite.exe 2072 antholite.exe 2072 antholite.exe 1576 antholite.exe 1576 antholite.exe 2676 antholite.exe 2676 antholite.exe 2780 antholite.exe 2780 antholite.exe 2600 antholite.exe 2600 antholite.exe 2684 antholite.exe 2684 antholite.exe 2656 antholite.exe 2656 antholite.exe 2524 antholite.exe 2524 antholite.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2188 1120 Rgh99876k7e.exe 28 PID 1120 wrote to memory of 2188 1120 Rgh99876k7e.exe 28 PID 1120 wrote to memory of 2188 1120 Rgh99876k7e.exe 28 PID 1120 wrote to memory of 2188 1120 Rgh99876k7e.exe 28 PID 2188 wrote to memory of 2616 2188 antholite.exe 29 PID 2188 wrote to memory of 2616 2188 antholite.exe 29 PID 2188 wrote to memory of 2616 2188 antholite.exe 29 PID 2188 wrote to memory of 2616 2188 antholite.exe 29 PID 2616 wrote to memory of 2608 2616 antholite.exe 30 PID 2616 wrote to memory of 2608 2616 antholite.exe 30 PID 2616 wrote to memory of 2608 2616 antholite.exe 30 PID 2616 wrote to memory of 2608 2616 antholite.exe 30 PID 2608 wrote to memory of 2660 2608 antholite.exe 31 PID 2608 wrote to memory of 2660 2608 antholite.exe 31 PID 2608 wrote to memory of 2660 2608 antholite.exe 31 PID 2608 wrote to memory of 2660 2608 antholite.exe 31 PID 2660 wrote to memory of 2556 2660 antholite.exe 32 PID 2660 wrote to memory of 2556 2660 antholite.exe 32 PID 2660 wrote to memory of 2556 2660 antholite.exe 32 PID 2660 wrote to memory of 2556 2660 antholite.exe 32 PID 2556 wrote to memory of 2364 2556 antholite.exe 33 PID 2556 wrote to memory of 2364 2556 antholite.exe 33 PID 2556 wrote to memory of 2364 2556 antholite.exe 33 PID 2556 wrote to memory of 2364 2556 antholite.exe 33 PID 2364 wrote to memory of 520 2364 antholite.exe 34 PID 2364 wrote to memory of 520 2364 antholite.exe 34 PID 2364 wrote to memory of 520 2364 antholite.exe 34 PID 2364 wrote to memory of 520 2364 antholite.exe 34 PID 520 wrote to memory of 1088 520 antholite.exe 35 PID 520 wrote to memory of 1088 520 antholite.exe 35 PID 520 wrote to memory of 1088 520 antholite.exe 35 PID 520 wrote to memory of 1088 520 antholite.exe 35 PID 1088 wrote to memory of 2876 1088 antholite.exe 36 PID 1088 wrote to memory of 2876 1088 antholite.exe 36 PID 1088 wrote to memory of 2876 1088 antholite.exe 36 PID 1088 wrote to memory of 2876 1088 antholite.exe 36 PID 2876 wrote to memory of 840 2876 antholite.exe 37 PID 2876 wrote to memory of 840 2876 antholite.exe 37 PID 2876 wrote to memory of 840 2876 antholite.exe 37 PID 2876 wrote to memory of 840 2876 antholite.exe 37 PID 840 wrote to memory of 1976 840 antholite.exe 38 PID 840 wrote to memory of 1976 840 antholite.exe 38 PID 840 wrote to memory of 1976 840 antholite.exe 38 PID 840 wrote to memory of 1976 840 antholite.exe 38 PID 1976 wrote to memory of 1952 1976 antholite.exe 39 PID 1976 wrote to memory of 1952 1976 antholite.exe 39 PID 1976 wrote to memory of 1952 1976 antholite.exe 39 PID 1976 wrote to memory of 1952 1976 antholite.exe 39 PID 1952 wrote to memory of 632 1952 antholite.exe 40 PID 1952 wrote to memory of 632 1952 antholite.exe 40 PID 1952 wrote to memory of 632 1952 antholite.exe 40 PID 1952 wrote to memory of 632 1952 antholite.exe 40 PID 632 wrote to memory of 1652 632 antholite.exe 41 PID 632 wrote to memory of 1652 632 antholite.exe 41 PID 632 wrote to memory of 1652 632 antholite.exe 41 PID 632 wrote to memory of 1652 632 antholite.exe 41 PID 1652 wrote to memory of 2160 1652 antholite.exe 42 PID 1652 wrote to memory of 2160 1652 antholite.exe 42 PID 1652 wrote to memory of 2160 1652 antholite.exe 42 PID 1652 wrote to memory of 2160 1652 antholite.exe 42 PID 2160 wrote to memory of 2180 2160 antholite.exe 43 PID 2160 wrote to memory of 2180 2160 antholite.exe 43 PID 2160 wrote to memory of 2180 2160 antholite.exe 43 PID 2160 wrote to memory of 2180 2160 antholite.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rgh99876k7e.exe"C:\Users\Admin\AppData\Local\Temp\Rgh99876k7e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Temp\Rgh99876k7e.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"6⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"7⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"10⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"11⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"12⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"14⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"16⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2180 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"18⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1512 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"19⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1620 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"20⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2192 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"21⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:464 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"22⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:956 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"23⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1824 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"24⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2416 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"25⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2072 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"26⤵
- Executes dropped EXE
PID:1228 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"27⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1576 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2676 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"29⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2780 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2600 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"31⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2684 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"32⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2656 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"33⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2524 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"34⤵
- Executes dropped EXE
PID:2568 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"35⤵
- Executes dropped EXE
PID:768 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:572 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"37⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"38⤵
- Executes dropped EXE
PID:1104 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"39⤵
- Executes dropped EXE
PID:860 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"40⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"41⤵
- Executes dropped EXE
PID:2748 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1420 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1224 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1552 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"48⤵
- Executes dropped EXE
PID:1708 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"49⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"50⤵
- Executes dropped EXE
PID:1832 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"52⤵
- Executes dropped EXE
PID:2260 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"54⤵
- Executes dropped EXE
PID:2768 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"56⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"57⤵
- Executes dropped EXE
PID:2548 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"58⤵
- Executes dropped EXE
PID:2996 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"59⤵
- Executes dropped EXE
PID:580 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"60⤵
- Executes dropped EXE
PID:1656 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"61⤵
- Executes dropped EXE
PID:472 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1272 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"66⤵PID:2144
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"67⤵
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"68⤵PID:2132
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"69⤵PID:2412
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"70⤵PID:112
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"71⤵PID:3052
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"72⤵
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"73⤵PID:1692
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"74⤵PID:2216
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"75⤵PID:1584
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"76⤵
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"77⤵
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"78⤵PID:2504
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"79⤵PID:1440
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"80⤵PID:392
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"81⤵PID:2824
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"82⤵PID:324
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"83⤵
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"84⤵PID:2744
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"85⤵PID:1924
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"86⤵PID:1800
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"87⤵
- System Location Discovery: System Language Discovery
PID:996 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"88⤵
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"89⤵PID:2424
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"90⤵PID:2392
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"91⤵PID:2176
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"92⤵
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"93⤵PID:1716
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"94⤵PID:2772
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"95⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"96⤵
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"97⤵PID:2404
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"98⤵PID:608
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"99⤵
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"100⤵PID:2340
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"101⤵PID:2728
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"102⤵PID:1932
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"103⤵PID:2184
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"104⤵
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"105⤵PID:1776
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"106⤵PID:912
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"107⤵PID:2328
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"108⤵PID:884
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"109⤵
- System Location Discovery: System Language Discovery
PID:2896 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"110⤵
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"111⤵
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"112⤵PID:2804
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"113⤵PID:2840
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"114⤵
- System Location Discovery: System Language Discovery
PID:1340 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"115⤵PID:1248
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"116⤵
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"117⤵
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"118⤵PID:328
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"119⤵PID:2668
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"120⤵PID:1020
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"121⤵
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"122⤵PID:1940
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-