Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
General
-
Target
86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe
-
Size
498KB
-
MD5
4a0c104a8b44b6607bf92dc24972db67
-
SHA1
7950f8f92c4778f16e7f10313233ea6ddec0b990
-
SHA256
86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208
-
SHA512
a142af9a7c5c9221f185245ca3834432cdc5a19bca51c15d27ce51bdbf8c609e5dc75241e58616f84c3001685b923696b7ca04e97e13c54212739ed2f68e9698
-
SSDEEP
6144:AC2Evn/IvIrb2mU/Vy5NkiQETBtCK1A/Dsz0KIS8QxNRuv0j1JtX7PXjrnCgLa55:VnC8CmU/MjkoBtCKmwxNEgzjLEcvB0
Malware Config
Extracted
remcos
RemoteHost
ejikeguys.lol:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-IR0L2E
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 64 IoCs
pid Process 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 920 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 920 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3208 set thread context of 920 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 676 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\russifier\stikprvestandardafvigelserne.lnk 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3208 wrote to memory of 852 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 85 PID 3208 wrote to memory of 852 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 85 PID 3208 wrote to memory of 852 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 85 PID 3208 wrote to memory of 1700 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 87 PID 3208 wrote to memory of 1700 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 87 PID 3208 wrote to memory of 1700 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 87 PID 3208 wrote to memory of 4372 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 89 PID 3208 wrote to memory of 4372 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 89 PID 3208 wrote to memory of 4372 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 89 PID 3208 wrote to memory of 4456 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 91 PID 3208 wrote to memory of 4456 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 91 PID 3208 wrote to memory of 4456 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 91 PID 3208 wrote to memory of 3400 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 93 PID 3208 wrote to memory of 3400 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 93 PID 3208 wrote to memory of 3400 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 93 PID 3208 wrote to memory of 4576 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 95 PID 3208 wrote to memory of 4576 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 95 PID 3208 wrote to memory of 4576 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 95 PID 3208 wrote to memory of 3228 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 97 PID 3208 wrote to memory of 3228 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 97 PID 3208 wrote to memory of 3228 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 97 PID 3208 wrote to memory of 5012 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 99 PID 3208 wrote to memory of 5012 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 99 PID 3208 wrote to memory of 5012 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 99 PID 3208 wrote to memory of 4856 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 101 PID 3208 wrote to memory of 4856 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 101 PID 3208 wrote to memory of 4856 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 101 PID 3208 wrote to memory of 2768 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 103 PID 3208 wrote to memory of 2768 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 103 PID 3208 wrote to memory of 2768 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 103 PID 3208 wrote to memory of 1656 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 105 PID 3208 wrote to memory of 1656 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 105 PID 3208 wrote to memory of 1656 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 105 PID 3208 wrote to memory of 1200 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 107 PID 3208 wrote to memory of 1200 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 107 PID 3208 wrote to memory of 1200 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 107 PID 3208 wrote to memory of 3000 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 109 PID 3208 wrote to memory of 3000 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 109 PID 3208 wrote to memory of 3000 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 109 PID 3208 wrote to memory of 5080 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 111 PID 3208 wrote to memory of 5080 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 111 PID 3208 wrote to memory of 5080 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 111 PID 3208 wrote to memory of 2020 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 113 PID 3208 wrote to memory of 2020 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 113 PID 3208 wrote to memory of 2020 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 113 PID 3208 wrote to memory of 3276 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 115 PID 3208 wrote to memory of 3276 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 115 PID 3208 wrote to memory of 3276 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 115 PID 3208 wrote to memory of 2012 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 117 PID 3208 wrote to memory of 2012 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 117 PID 3208 wrote to memory of 2012 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 117 PID 3208 wrote to memory of 4916 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 119 PID 3208 wrote to memory of 4916 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 119 PID 3208 wrote to memory of 4916 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 119 PID 3208 wrote to memory of 3160 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 121 PID 3208 wrote to memory of 3160 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 121 PID 3208 wrote to memory of 3160 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 121 PID 3208 wrote to memory of 2932 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 123 PID 3208 wrote to memory of 2932 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 123 PID 3208 wrote to memory of 2932 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 123 PID 3208 wrote to memory of 3032 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 125 PID 3208 wrote to memory of 3032 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 125 PID 3208 wrote to memory of 3032 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 125 PID 3208 wrote to memory of 1652 3208 86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe"C:\Users\Admin\AppData\Local\Temp\86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "250^177"2⤵PID:852
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵PID:1700
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "227^177"2⤵PID:4372
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "255^177"2⤵
- System Location Discovery: System Language Discovery
PID:4456
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵PID:3400
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "253^177"2⤵PID:4576
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵PID:3228
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "131^177"2⤵PID:5012
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵PID:4856
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵PID:2768
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "242^177"2⤵PID:1656
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵PID:1200
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵PID:3000
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "208^177"2⤵PID:5080
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "197^177"2⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵
- System Location Discovery: System Language Discovery
PID:3276
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "247^177"2⤵PID:2012
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:4916
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵PID:3160
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵PID:2932
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "240^177"2⤵PID:3032
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "153^177"2⤵PID:1652
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "220^177"2⤵PID:2656
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:3676
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵PID:3256
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "133^177"2⤵
- System Location Discovery: System Language Discovery
PID:4560
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:2684
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:436
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:1720
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:3580
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:3488
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:4028
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "201^177"2⤵PID:4120
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "137^177"2⤵PID:892
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:2344
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
- System Location Discovery: System Language Discovery
PID:4048
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:4432
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:2900
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
- System Location Discovery: System Language Discovery
PID:2424
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:1576
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:3464
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
- System Location Discovery: System Language Discovery
PID:2236
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:1020
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
- System Location Discovery: System Language Discovery
PID:4584
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
- System Location Discovery: System Language Discovery
PID:4348
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:4024
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
- System Location Discovery: System Language Discovery
PID:440
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:5084
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "193^177"2⤵
- System Location Discovery: System Language Discovery
PID:1380
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
- System Location Discovery: System Language Discovery
PID:1120
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:436
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:1656
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:1896
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:3904
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "133^177"2⤵PID:5080
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:4016
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:4672
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:468
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:4044
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:2904
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "201^177"2⤵PID:1584
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "137^177"2⤵PID:1736
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
- System Location Discovery: System Language Discovery
PID:3152
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:1464
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:4912
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:4836
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:3184
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
- System Location Discovery: System Language Discovery
PID:4272
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "152^177"2⤵
- System Location Discovery: System Language Discovery
PID:4708
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:5036
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "159^177"2⤵PID:4992
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
- System Location Discovery: System Language Discovery
PID:1412
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "132^177"2⤵PID:4620
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "141^177"2⤵PID:3668
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "250^177"2⤵PID:2768
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵PID:4932
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "227^177"2⤵PID:3476
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "255^177"2⤵PID:3008
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵
- System Location Discovery: System Language Discovery
PID:772
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "253^177"2⤵PID:4764
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵
- System Location Discovery: System Language Discovery
PID:1632
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "131^177"2⤵PID:2344
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵PID:3940
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵PID:4300
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "231^177"2⤵PID:1108
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:2900
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵PID:2744
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "197^177"2⤵PID:852
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "196^177"2⤵
- System Location Discovery: System Language Discovery
PID:3248
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "208^177"2⤵PID:528
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵PID:4456
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "240^177"2⤵PID:1192
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵PID:632
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵PID:4412
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "222^177"2⤵PID:3256
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "210^177"2⤵PID:4224
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "153^177"2⤵
- System Location Discovery: System Language Discovery
PID:1196
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:3388
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:1444
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:1720
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:3180
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:1384
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "137^177"2⤵
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "135^177"2⤵PID:2376
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "137^177"2⤵PID:624
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "128^177"2⤵PID:2176
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "133^177"2⤵PID:4512
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "134^177"2⤵PID:4596
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "131^177"2⤵PID:1548
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:960
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
- System Location Discovery: System Language Discovery
PID:1092
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
- System Location Discovery: System Language Discovery
PID:1540
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:3032
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:3660
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:5072
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "201^177"2⤵PID:3624
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵
- System Location Discovery: System Language Discovery
PID:3676
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:2944
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:4900
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:5036
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:4548
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:1196
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:932
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:5060
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:4732
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "201^177"2⤵PID:1520
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "133^177"2⤵PID:3524
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:5100
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "152^177"2⤵PID:3004
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "193^177"2⤵PID:4524
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "159^177"2⤵PID:2020
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵PID:4956
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "128^177"2⤵PID:4512
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "141^177"2⤵PID:1624
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "250^177"2⤵PID:4052
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵PID:3900
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "227^177"2⤵PID:2968
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "255^177"2⤵
- System Location Discovery: System Language Discovery
PID:3804
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵PID:4012
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "253^177"2⤵PID:5008
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵PID:4988
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "131^177"2⤵
- System Location Discovery: System Language Discovery
PID:3980
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵
- System Location Discovery: System Language Discovery
PID:760
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵PID:2564
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "226^177"2⤵
- System Location Discovery: System Language Discovery
PID:4024
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵PID:3700
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "197^177"2⤵PID:4840
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "247^177"2⤵PID:2404
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
- System Location Discovery: System Language Discovery
PID:436
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵PID:4616
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵
- System Location Discovery: System Language Discovery
PID:1048
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "225^177"2⤵PID:2536
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "222^177"2⤵PID:4028
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:4516
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "223^177"2⤵
- System Location Discovery: System Language Discovery
PID:4400
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "197^177"2⤵PID:3788
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵PID:4328
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵PID:1168
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "153^177"2⤵PID:2832
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:3840
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:388
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵PID:4868
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "132^177"2⤵
- System Location Discovery: System Language Discovery
PID:1220
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:2312
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:4592
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:2532
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
- System Location Discovery: System Language Discovery
PID:4104
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "135^177"2⤵PID:3280
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "134^177"2⤵PID:452
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "134^177"2⤵PID:1884
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:2528
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:1480
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:3876
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:1888
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:5116
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
- System Location Discovery: System Language Discovery
PID:4420
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
- System Location Discovery: System Language Discovery
PID:4368
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:224
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:1272
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "152^177"2⤵PID:2180
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:1860
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "159^177"2⤵PID:2880
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵PID:2060
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵PID:4304
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "141^177"2⤵PID:1992
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "250^177"2⤵PID:4308
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵
- System Location Discovery: System Language Discovery
PID:724
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "227^177"2⤵PID:4372
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "255^177"2⤵PID:5008
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵PID:2324
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "253^177"2⤵PID:4576
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵PID:760
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "131^177"2⤵PID:4900
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵PID:3700
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "227^177"2⤵PID:1204
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵PID:5000
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "208^177"2⤵PID:3668
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "213^177"2⤵PID:2768
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "247^177"2⤵
- System Location Discovery: System Language Discovery
PID:4932
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:1800
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵PID:4668
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵PID:2152
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "153^177"2⤵
- System Location Discovery: System Language Discovery
PID:556
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:3788
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:1708
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
- System Location Discovery: System Language Discovery
PID:1168
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "132^177"2⤵PID:2832
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:1584
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:2164
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:4460
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:1220
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
- System Location Discovery: System Language Discovery
PID:816
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "128^177"2⤵PID:2992
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:5064
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:4272
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:2944
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:5052
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "137^177"2⤵PID:3968
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "135^177"2⤵PID:1580
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "137^177"2⤵PID:4204
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "128^177"2⤵PID:4804
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "133^177"2⤵
- System Location Discovery: System Language Discovery
PID:920
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "134^177"2⤵PID:4888
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "131^177"2⤵
- System Location Discovery: System Language Discovery
PID:1896
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:2736
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:4444
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "155^177"2⤵PID:1864
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
- System Location Discovery: System Language Discovery
PID:4524
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
- System Location Discovery: System Language Discovery
PID:4488
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:1208
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:2904
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:2256
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:2900
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
- System Location Discovery: System Language Discovery
PID:3080
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:852
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "152^177"2⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "159^177"2⤵PID:3716
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
- System Location Discovery: System Language Discovery
PID:3100
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵PID:2608
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "141^177"2⤵PID:628
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "196^177"2⤵PID:3192
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "194^177"2⤵PID:4224
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵PID:4808
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵PID:2988
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵
- System Location Discovery: System Language Discovery
PID:5060
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "131^177"2⤵PID:1900
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵PID:3420
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵PID:1448
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "242^177"2⤵
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "208^177"2⤵PID:3004
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵PID:2376
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵
- System Location Discovery: System Language Discovery
PID:4256
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "230^177"2⤵PID:3536
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:4324
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "223^177"2⤵PID:4432
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "213^177"2⤵
- System Location Discovery: System Language Discovery
PID:960
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "222^177"2⤵PID:3152
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "198^177"2⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "225^177"2⤵PID:2436
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵PID:4592
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "222^177"2⤵PID:2384
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "210^177"2⤵PID:820
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "240^177"2⤵
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "153^177"2⤵
- System Location Discovery: System Language Discovery
PID:452
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:5012
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:3700
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
- System Location Discovery: System Language Discovery
PID:1204
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "128^177"2⤵PID:2136
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:2268
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:3400
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:3524
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:3356
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:4516
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:4408
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:3788
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:1316
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:4916
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
- System Location Discovery: System Language Discovery
PID:3896
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
- System Location Discovery: System Language Discovery
PID:4304
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:3712
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵PID:1564
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:5072
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵PID:4348
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵PID:4272
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵PID:2564
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "152^177"2⤵PID:408
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "141^177"2⤵PID:3256
-
-
C:\Users\Admin\AppData\Local\Temp\86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe"C:\Users\Admin\AppData\Local\Temp\86b6cfdcb0feccdea122debf61b51c1756e53def13a4468637539264ec35d208.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5375e8a08471dc6f85f3828488b1147b3
SHA11941484ac710fc301a7d31d6f1345e32a21546af
SHA2564c86b238e64ecfaabe322a70fd78db229a663ccc209920f3385596a6e3205f78
SHA5125ba29db13723ddf27b265a4548606274b850d076ae1f050c64044f8ccd020585ad766c85c3e20003a22f356875f76fb3679c89547b0962580d8e5a42b082b9a8
-
Filesize
6KB
MD54bbc9d77ef7f748f8c85750c3a445f0a
SHA1d57a8304bb44ccdb3163b880b3c1bb213461399d
SHA256482536968672d70279a5204060ff84ace25237f24b1bdf3b02e289d50ea5450c
SHA512b9430939daab0c8b7e77b96f2f7f85e8e1abd9f43eccbdf94078f77ef05b31a2a31f04ca3a2eff5aa7cc965029ed437af2eb100c197ef51f128ca827ad20e902