Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 15:21
Static task
static1
Behavioral task
behavioral1
Sample
96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe
Resource
win10v2004-20240802-en
General
-
Target
96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe
-
Size
2.8MB
-
MD5
e6c2e04d19d1e3bb6c9328c4818166dd
-
SHA1
fe820813cf5ffc8b32f727fbd026856e2af665c9
-
SHA256
96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872
-
SHA512
c0f594ff2a1120f87518802b39e482e8611dfe371ba0be7fbcd41c5423ec73117e527c6920744f9ce0c673a4f0a44c7324fc8054774613917595557ee9582a04
-
SSDEEP
12288:vj7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7:/cX
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 60 IoCs
pid Process 3984 Logo1_.exe 1252 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2640 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1940 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 5092 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1188 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4560 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4920 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2148 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 836 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2292 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4344 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1436 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 5084 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 5092 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3232 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4888 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3916 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3676 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2336 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2892 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4148 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3212 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4344 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1788 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3268 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3720 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3736 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4244 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4824 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4768 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3588 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 760 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1136 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1692 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2108 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4912 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 876 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4532 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2920 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4652 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 628 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3744 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3004 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1596 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4116 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4108 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4452 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4848 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1260 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4888 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3452 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2504 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1344 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3464 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2444 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4060 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 536 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1472 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TempCom = "C:\\WINDOWS\\FONTS\\0C528.com" 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Help\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\misc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Resources\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\logger\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\en\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\rundl132.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File opened for modification C:\WINDOWS\FONTS\0C528.com 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\WINDOWS\FONTS\0C528.com 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 760 1472 WerFault.exe 277 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe 3984 Logo1_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1472 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4752 wrote to memory of 4304 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 83 PID 4752 wrote to memory of 4304 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 83 PID 4752 wrote to memory of 4304 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 83 PID 4752 wrote to memory of 3984 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 85 PID 4752 wrote to memory of 3984 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 85 PID 4752 wrote to memory of 3984 4752 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 85 PID 3984 wrote to memory of 4828 3984 Logo1_.exe 87 PID 3984 wrote to memory of 4828 3984 Logo1_.exe 87 PID 3984 wrote to memory of 4828 3984 Logo1_.exe 87 PID 4828 wrote to memory of 3252 4828 net.exe 89 PID 4828 wrote to memory of 3252 4828 net.exe 89 PID 4828 wrote to memory of 3252 4828 net.exe 89 PID 4304 wrote to memory of 1252 4304 cmd.exe 90 PID 4304 wrote to memory of 1252 4304 cmd.exe 90 PID 4304 wrote to memory of 1252 4304 cmd.exe 90 PID 1252 wrote to memory of 4768 1252 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 91 PID 1252 wrote to memory of 4768 1252 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 91 PID 1252 wrote to memory of 4768 1252 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 91 PID 4768 wrote to memory of 2640 4768 cmd.exe 94 PID 4768 wrote to memory of 2640 4768 cmd.exe 94 PID 4768 wrote to memory of 2640 4768 cmd.exe 94 PID 2640 wrote to memory of 3464 2640 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 95 PID 2640 wrote to memory of 3464 2640 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 95 PID 2640 wrote to memory of 3464 2640 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 95 PID 3464 wrote to memory of 1940 3464 cmd.exe 97 PID 3464 wrote to memory of 1940 3464 cmd.exe 97 PID 3464 wrote to memory of 1940 3464 cmd.exe 97 PID 1940 wrote to memory of 2408 1940 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 98 PID 1940 wrote to memory of 2408 1940 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 98 PID 1940 wrote to memory of 2408 1940 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 98 PID 2408 wrote to memory of 5092 2408 cmd.exe 100 PID 2408 wrote to memory of 5092 2408 cmd.exe 100 PID 2408 wrote to memory of 5092 2408 cmd.exe 100 PID 5092 wrote to memory of 3140 5092 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 101 PID 5092 wrote to memory of 3140 5092 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 101 PID 5092 wrote to memory of 3140 5092 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 101 PID 3140 wrote to memory of 1188 3140 cmd.exe 104 PID 3140 wrote to memory of 1188 3140 cmd.exe 104 PID 3140 wrote to memory of 1188 3140 cmd.exe 104 PID 1188 wrote to memory of 2356 1188 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 105 PID 1188 wrote to memory of 2356 1188 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 105 PID 1188 wrote to memory of 2356 1188 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 105 PID 2356 wrote to memory of 4560 2356 cmd.exe 107 PID 2356 wrote to memory of 4560 2356 cmd.exe 107 PID 2356 wrote to memory of 4560 2356 cmd.exe 107 PID 4560 wrote to memory of 536 4560 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 108 PID 4560 wrote to memory of 536 4560 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 108 PID 4560 wrote to memory of 536 4560 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 108 PID 536 wrote to memory of 4920 536 cmd.exe 110 PID 536 wrote to memory of 4920 536 cmd.exe 110 PID 536 wrote to memory of 4920 536 cmd.exe 110 PID 4920 wrote to memory of 2328 4920 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 111 PID 4920 wrote to memory of 2328 4920 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 111 PID 4920 wrote to memory of 2328 4920 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 111 PID 3984 wrote to memory of 3504 3984 Logo1_.exe 56 PID 3984 wrote to memory of 3504 3984 Logo1_.exe 56 PID 2328 wrote to memory of 2148 2328 cmd.exe 115 PID 2328 wrote to memory of 2148 2328 cmd.exe 115 PID 2328 wrote to memory of 2148 2328 cmd.exe 115 PID 2148 wrote to memory of 3672 2148 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 116 PID 2148 wrote to memory of 3672 2148 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 116 PID 2148 wrote to memory of 3672 2148 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 116 PID 3672 wrote to memory of 836 3672 cmd.exe 118 PID 3672 wrote to memory of 836 3672 cmd.exe 118
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7A60.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7BB8.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7CE1.bat7⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"8⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7DDB.bat9⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"10⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7E96.bat11⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7F32.bat13⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"14⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a800D.bat15⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a80B9.bat17⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"18⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8230.bat19⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"20⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a830B.bat21⤵
- System Location Discovery: System Language Discovery
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"22⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a83E5.bat23⤵
- System Location Discovery: System Language Discovery
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"24⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a84B1.bat25⤵
- System Location Discovery: System Language Discovery
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"26⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a854D.bat27⤵
- System Location Discovery: System Language Discovery
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"28⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a86C4.bat29⤵
- System Location Discovery: System Language Discovery
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"30⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a877F.bat31⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"32⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8906.bat33⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a89E1.bat35⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"36⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8A5E.bat37⤵
- System Location Discovery: System Language Discovery
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"38⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8ACB.bat39⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"40⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8B87.bat41⤵
- System Location Discovery: System Language Discovery
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"42⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8C52.bat43⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"44⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8CFE.bat45⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"46⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8D5B.bat47⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"48⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8DA9.bat49⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8E07.bat51⤵
- System Location Discovery: System Language Discovery
PID:216 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"52⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8E46.bat53⤵
- System Location Discovery: System Language Discovery
PID:760 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"54⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8EA3.bat55⤵
- System Location Discovery: System Language Discovery
PID:888 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"56⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8EF2.bat57⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"58⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8F5F.bat59⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"60⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8FFB.bat61⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9088.bat63⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"64⤵
- Drops file in Windows directory
PID:3620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9124.bat65⤵
- System Location Discovery: System Language Discovery
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"66⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a91C0.bat67⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"68⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a926C.bat69⤵
- System Location Discovery: System Language Discovery
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"70⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9357.bat71⤵
- System Location Discovery: System Language Discovery
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"72⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a947F.bat73⤵
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"74⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a952B.bat75⤵
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"76⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9589.bat77⤵
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"78⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a95F6.bat79⤵
- System Location Discovery: System Language Discovery
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"80⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9635.bat81⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"82⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4532 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9693.bat83⤵
- System Location Discovery: System Language Discovery
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"84⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a96E1.bat85⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"86⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a974E.bat87⤵
- System Location Discovery: System Language Discovery
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"88⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a979C.bat89⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"90⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a97EA.bat91⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"92⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9848.bat93⤵
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"94⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a98B6.bat95⤵
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"96⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9913.bat97⤵
- System Location Discovery: System Language Discovery
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"98⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9971.bat99⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"100⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9A1D.bat101⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"102⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9AB9.bat103⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"104⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9D98.bat105⤵
- System Location Discovery: System Language Discovery
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"106⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9F6C.bat107⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"108⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA009.bat109⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"110⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA095.bat111⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"112⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA131.bat113⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"114⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA1CE.bat115⤵
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"116⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA26A.bat117⤵
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"118⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA316.bat119⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"120⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA3C2.bat121⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"122⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1472
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-