Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe
Resource
win7-20240903-en
General
-
Target
4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe
-
Size
8.9MB
-
MD5
44159a48df832e9a12636f37044b29ea
-
SHA1
a5c43861ad91a35e71cb0ab748384b092fe4f841
-
SHA256
4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22
-
SHA512
4896d86350f36863967277530a837956482b046a2fd7b5ec456a0886424e2268f0414f20e9d7ecd285f4f6ec3d04c39aaffc10a4e722a31100aad1aff1beee56
-
SSDEEP
196608:8HygLd6jkPHSwzSnuUxxpiS0My1WeeNSvJgePF4yM/CdVcVhF5:NWUerWZt0Myph20+
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral2/memory/228-76-0x0000000010000000-0x0000000010017000-memory.dmp family_blackmoon behavioral2/memory/228-73-0x0000000010000000-0x0000000010017000-memory.dmp family_blackmoon behavioral2/memory/4408-178-0x0000000010000000-0x0000000010017000-memory.dmp family_blackmoon -
resource yara_rule behavioral2/files/0x0001000000000033-72.dat aspack_v212_v242 -
Checks BIOS information in registry 2 TTPs 40 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Áè·çºÏ»÷.exe -
Executes dropped EXE 40 IoCs
pid Process 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 228 Áè·çºÏ»÷.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4408 Áè·çºÏ»÷.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2444 Áè·çºÏ»÷.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4308 Áè·çºÏ»÷.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4160 Áè·çºÏ»÷.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4024 Áè·çºÏ»÷.exe 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2688 Áè·çºÏ»÷.exe 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4308 Áè·çºÏ»÷.exe 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 788 Áè·çºÏ»÷.exe 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1244 Áè·çºÏ»÷.exe 4636 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 392 Áè·çºÏ»÷.exe 1144 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2392 Áè·çºÏ»÷.exe 2624 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2684 Áè·çºÏ»÷.exe 5072 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4356 Áè·çºÏ»÷.exe 4228 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1696 Áè·çºÏ»÷.exe 5056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1396 Áè·çºÏ»÷.exe 1960 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4120 Áè·çºÏ»÷.exe 392 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4432 Áè·çºÏ»÷.exe 1284 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2288 Áè·çºÏ»÷.exe 3312 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2420 Áè·çºÏ»÷.exe -
Loads dropped DLL 20 IoCs
pid Process 228 Áè·çºÏ»÷.exe 4408 Áè·çºÏ»÷.exe 2444 Áè·çºÏ»÷.exe 4308 Áè·çºÏ»÷.exe 4160 Áè·çºÏ»÷.exe 4024 Áè·çºÏ»÷.exe 2688 Áè·çºÏ»÷.exe 4308 Áè·çºÏ»÷.exe 788 Áè·çºÏ»÷.exe 1244 Áè·çºÏ»÷.exe 392 Áè·çºÏ»÷.exe 2392 Áè·çºÏ»÷.exe 2684 Áè·çºÏ»÷.exe 4356 Áè·çºÏ»÷.exe 1696 Áè·çºÏ»÷.exe 1396 Áè·çºÏ»÷.exe 4120 Áè·çºÏ»÷.exe 4432 Áè·çºÏ»÷.exe 2288 Áè·çºÏ»÷.exe 2420 Áè·çºÏ»÷.exe -
resource yara_rule behavioral2/memory/4640-6-0x0000000003B00000-0x0000000003B08000-memory.dmp upx behavioral2/memory/4640-5-0x0000000002250000-0x000000000225B000-memory.dmp upx behavioral2/memory/4640-4-0x0000000002230000-0x000000000223B000-memory.dmp upx behavioral2/memory/4888-22-0x00000000037B0000-0x00000000037B8000-memory.dmp upx behavioral2/memory/4888-21-0x0000000001F70000-0x0000000001F7B000-memory.dmp upx behavioral2/memory/4888-20-0x0000000001F60000-0x0000000001F6B000-memory.dmp upx behavioral2/memory/4888-23-0x00000000037B0000-0x00000000037B8000-memory.dmp upx behavioral2/files/0x0001000000000034-70.dat upx behavioral2/memory/228-75-0x0000000000400000-0x00000000010F7000-memory.dmp upx behavioral2/memory/228-77-0x0000000000400000-0x00000000010F7000-memory.dmp upx behavioral2/memory/228-80-0x0000000000400000-0x00000000010F7000-memory.dmp upx behavioral2/memory/4408-177-0x0000000000400000-0x00000000010F7000-memory.dmp upx behavioral2/memory/4408-183-0x0000000000400000-0x00000000010F7000-memory.dmp upx -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\I: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\H: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\G: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\T: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\B: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\O: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\R: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\X: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\W: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\B: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\W: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\Q: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\T: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\W: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\H: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\N: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\L: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\H: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\F: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\Z: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\S: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\W: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\A: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\L: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\H: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\W: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\M: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\M: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\I: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\M: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\W: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\Y: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\B: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\U: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\H: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\H: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\E: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\I: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\O: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\Z: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\O: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\A: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\G: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\V: Áè·çºÏ»÷.exe File opened (read-only) \??\N: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\S: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\K: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\E: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\G: Áè·çºÏ»÷.exe File opened (read-only) \??\K: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\G: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\F: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\S: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\T: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\H: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\I: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\I: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\M: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\O: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\K: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\G: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\V: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened (read-only) \??\M: 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 20 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe File opened for modification \??\PhysicalDrive0 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
pid Process 4640 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4636 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1144 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2624 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5072 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4228 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1960 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 392 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1284 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3312 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 41 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Áè·çºÏ»÷.exe -
Checks processor information in registry 2 TTPs 40 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Áè·çºÏ»÷.exe -
Enumerates system info in registry 2 TTPs 64 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Áè·çºÏ»÷.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Áè·çºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Áè·çºÏ»÷.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4640 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4640 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4640 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4640 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4640 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4640 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe Token: SeDebugPrivilege 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4640 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4636 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4636 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4636 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4636 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1144 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1144 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1144 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1144 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2624 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2624 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2624 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2624 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5072 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5072 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5072 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5072 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4228 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4228 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4228 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe -
Suspicious use of SendNotifyMessage 63 IoCs
pid Process 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4636 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4636 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4636 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1144 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1144 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1144 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2624 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2624 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2624 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5072 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5072 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5072 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4228 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4228 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4228 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1960 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1960 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1960 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 392 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 392 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 392 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1284 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1284 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1284 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3312 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3312 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe -
Suspicious use of SetWindowsHookEx 63 IoCs
pid Process 4640 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4640 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4640 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4636 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4636 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4636 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1144 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1144 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1144 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2624 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2624 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 2624 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5072 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5072 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5072 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4228 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4228 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 4228 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 5056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1960 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1960 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1960 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 392 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 392 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 392 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1284 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1284 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 1284 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3312 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3312 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 3312 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4640 wrote to memory of 4888 4640 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 85 PID 4640 wrote to memory of 4888 4640 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 85 PID 4640 wrote to memory of 4888 4640 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 85 PID 4888 wrote to memory of 228 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 86 PID 4888 wrote to memory of 228 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 86 PID 4888 wrote to memory of 228 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 86 PID 4888 wrote to memory of 4056 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 88 PID 4888 wrote to memory of 4056 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 88 PID 4888 wrote to memory of 4056 4888 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 88 PID 4056 wrote to memory of 4408 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 89 PID 4056 wrote to memory of 4408 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 89 PID 4056 wrote to memory of 4408 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 89 PID 4056 wrote to memory of 3912 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 90 PID 4056 wrote to memory of 3912 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 90 PID 4056 wrote to memory of 3912 4056 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 90 PID 3912 wrote to memory of 2444 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 91 PID 3912 wrote to memory of 2444 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 91 PID 3912 wrote to memory of 2444 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 91 PID 3912 wrote to memory of 2652 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 92 PID 3912 wrote to memory of 2652 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 92 PID 3912 wrote to memory of 2652 3912 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 92 PID 2652 wrote to memory of 4308 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 101 PID 2652 wrote to memory of 4308 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 101 PID 2652 wrote to memory of 4308 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 101 PID 2652 wrote to memory of 3328 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 94 PID 2652 wrote to memory of 3328 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 94 PID 2652 wrote to memory of 3328 2652 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 94 PID 3328 wrote to memory of 4160 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 95 PID 3328 wrote to memory of 4160 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 95 PID 3328 wrote to memory of 4160 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 95 PID 3328 wrote to memory of 3608 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 96 PID 3328 wrote to memory of 3608 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 96 PID 3328 wrote to memory of 3608 3328 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 96 PID 3608 wrote to memory of 4024 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 97 PID 3608 wrote to memory of 4024 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 97 PID 3608 wrote to memory of 4024 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 97 PID 3608 wrote to memory of 4980 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 98 PID 3608 wrote to memory of 4980 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 98 PID 3608 wrote to memory of 4980 3608 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 98 PID 4980 wrote to memory of 2688 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 99 PID 4980 wrote to memory of 2688 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 99 PID 4980 wrote to memory of 2688 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 99 PID 4980 wrote to memory of 3352 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 100 PID 4980 wrote to memory of 3352 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 100 PID 4980 wrote to memory of 3352 4980 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 100 PID 3352 wrote to memory of 4308 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 101 PID 3352 wrote to memory of 4308 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 101 PID 3352 wrote to memory of 4308 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 101 PID 3352 wrote to memory of 2940 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 102 PID 3352 wrote to memory of 2940 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 102 PID 3352 wrote to memory of 2940 3352 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 102 PID 2940 wrote to memory of 788 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 108 PID 2940 wrote to memory of 788 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 108 PID 2940 wrote to memory of 788 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 108 PID 2940 wrote to memory of 3088 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 109 PID 2940 wrote to memory of 3088 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 109 PID 2940 wrote to memory of 3088 2940 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 109 PID 3088 wrote to memory of 1244 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 111 PID 3088 wrote to memory of 1244 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 111 PID 3088 wrote to memory of 1244 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 111 PID 3088 wrote to memory of 4636 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 112 PID 3088 wrote to memory of 4636 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 112 PID 3088 wrote to memory of 4636 3088 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 112 PID 4636 wrote to memory of 392 4636 4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"C:\Users\Admin\AppData\Local\Temp\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"1⤵
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4640 -
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4888 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:228
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:4408
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"4⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3912 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:2444
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"5⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:4308
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"6⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3328 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"7⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:4160
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"7⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3608 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"8⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:4024
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"8⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4980 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"9⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:2688
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"9⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"10⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:4308
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"10⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"11⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:788
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"11⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3088 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"12⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:1244
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"12⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"13⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:392
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"13⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1144 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"14⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:2392
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"14⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2624 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"15⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:2684
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"15⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5072 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"16⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:4356
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"16⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4228 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"17⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:1696
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"17⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5056 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"18⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:1396
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"18⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1960 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"19⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:4120
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"19⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:392 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"20⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:4432
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"20⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1284 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"21⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:2288
-
-
F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"F:\Áè·çºÏ»÷(΢¶Ë)\4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe"21⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3312 -
F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"F:\Áè·çºÏ»÷(΢¶Ë)\Áè·çºÏ»÷.exe"22⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:2420
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.9MB
MD544159a48df832e9a12636f37044b29ea
SHA1a5c43861ad91a35e71cb0ab748384b092fe4f841
SHA2564e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22
SHA5124896d86350f36863967277530a837956482b046a2fd7b5ec456a0886424e2268f0414f20e9d7ecd285f4f6ec3d04c39aaffc10a4e722a31100aad1aff1beee56
-
Filesize
17B
MD5a5a6f4a892f56c69fa47a593d716c07c
SHA11e0f1227cd2f6d4e1892b8b0a1923a791a07df66
SHA2565f3e24e0c45c1e17ee349002c79fb1c0ec3aea2477a1f57dadeae3a1c4749bb2
SHA51205262b7cb2612b0fbc0cc2eeca9729842aeb1e9d3dd86c067d0cc37cb93a96009526eb9ce16f9205fb4d58f97b3d2f09743808e896c008cb09186b499bff3de2
-
Filesize
53B
MD533a93ca066f956f022b751d236b38e97
SHA1373bd813621d8a60038278635141577dd80bf568
SHA25615632ffd950219a9ab782df6b5702ba38ae0ffc3757f57d796a849671d10f033
SHA51250322393d60c12bdb54c4136d7949a4c35ffdef14c65c324178b4d48042681890e9cd05e6ab2c575aaba042b2fa028f38fe886f440171499dc05aaf7acc1f448
-
Filesize
20KB
MD57c162d50228922f46defb0211985516e
SHA1661a486eb3895bed6f87e8bb315f045961f2cc41
SHA2565360f12275b203fe5340a3bfa4684de7b48d61ee1dc36954ca7ae764e0a6d216
SHA5127be26eec6968322702d27abf92556dd210d43f2c65ded0631ea2f4a8b8cdf2eac6c545541c4dde07212c6e0c59a0f7be5425b711797d2c20f1d748475dac5370
-
Filesize
6.2MB
MD55b6ab4e89a68d01d8e8c9f615f6c8916
SHA186caa6a20650f8c5e0a9a3625f50deda83796c78
SHA256d2c6aac54c67926c5c83f45ebed6a718acab91e40b19914968aeb80afcc5a15e
SHA5127c6f16a62f0b59477366cd7e05e2599617edeb81ea5b04e3531ff7dd09854037f29205f4854ddbd9d190be941af2db97f8177d5c02e4114bd09d212aced2a504
-
Filesize
766B
MD53d27f2460e50f2411b7d353a7950cc06
SHA176296a833032dd98af6d3b8224f80cf70f1a1a41
SHA2560f9d7ac5210ae21af9f413fdc6f17edd67abcdf83490ffa9f66f665379031dfe
SHA5127a482dd79e5439e8193995c3d8f5e69d3cd97bf12e53661465b4a72fe3ea24801c476bccc28e5941d78b50f30c21036233e475a683c496c232cd70e03d6ac31c