Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
EU.exe
Resource
win10v2004-20241007-en
General
-
Target
EU.exe
-
Size
2.1MB
-
MD5
84714242749ee3c7f626d1e9684e391a
-
SHA1
f17abb2ab4ff1bb08360420c73e4d9496045ac1e
-
SHA256
3c65766763fc26ba80bd11313a587f3e3206f9ba3fea6a39decd66a700cc9213
-
SHA512
513010ecf933aaa85ae887b59aa03b8ddebc406cdd9ae3b889fdb2768ab33e363f81d17813e5caefe42e57162b45a81097a95723345e232b288be432150b4a28
-
SSDEEP
49152:n2mx9FhsvlnBh5WYNo4QP6Dc3V0bO2EYTRIagYDitK/z5:n2m9WTNopCDc3V0bJE6RrHiE/z
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
193.161.193.99:53757
hsaurcrgqwhjimnkbht
-
delay
1
-
install
true
-
install_file
Load.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a000000023b65-17.dat family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3120 powershell.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Load.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Done.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Load.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Load.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Load.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EU.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnk Done.exe -
Executes dropped EXE 64 IoCs
pid Process 2572 Done.exe 4072 Load.exe 552 Done.exe 1472 Load.exe 2956 apihost.exe 960 Done.exe 3180 Load.exe 3704 Done.exe 1992 Load.exe 1508 Load.exe 4588 Done.exe 1520 Load.exe 4248 Load.exe 1880 Done.exe 2560 Load.exe 3128 Done.exe 4040 Load.exe 5000 Done.exe 4444 Load.exe 1236 Done.exe 4316 Load.exe 1112 Done.exe 4424 Load.exe 3504 Done.exe 1580 Load.exe 4768 Done.exe 3360 Load.exe 4888 Done.exe 1620 Load.exe 3704 Done.exe 2248 Load.exe 688 Done.exe 3684 Load.exe 4392 Done.exe 4548 Load.exe 1920 Done.exe 720 Load.exe 872 Done.exe 3248 Load.exe 5100 Done.exe 2256 Load.exe 920 Done.exe 2804 Load.exe 1168 Done.exe 1136 Load.exe 1548 Done.exe 456 Load.exe 1580 Done.exe 4472 Load.exe 3228 Done.exe 1160 Load.exe 1460 Done.exe 2560 Load.exe 4692 Done.exe 4868 Load.exe 5036 Done.exe 3772 Load.exe 2264 Done.exe 4216 Load.exe 3512 Done.exe 868 Load.exe 4168 Done.exe 4728 Load.exe 2344 Done.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apihost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Done.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 3068 timeout.exe 3760 timeout.exe 3296 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4320 schtasks.exe 2348 schtasks.exe 1688 schtasks.exe 4372 schtasks.exe 3148 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 552 Done.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 3120 powershell.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 4072 Load.exe 3120 powershell.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 1472 Load.exe 3180 Load.exe 3180 Load.exe 3180 Load.exe 3180 Load.exe 3180 Load.exe 3180 Load.exe 3180 Load.exe 3180 Load.exe 3180 Load.exe 3180 Load.exe 3180 Load.exe 3180 Load.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4072 Load.exe Token: SeDebugPrivilege 1472 Load.exe Token: SeDebugPrivilege 2572 Done.exe Token: SeDebugPrivilege 3120 powershell.exe Token: SeDebugPrivilege 552 Done.exe Token: SeDebugPrivilege 3180 Load.exe Token: SeDebugPrivilege 1992 Load.exe Token: SeDebugPrivilege 1508 Load.exe Token: SeDebugPrivilege 1520 Load.exe Token: SeDebugPrivilege 4248 Load.exe Token: SeDebugPrivilege 2560 Load.exe Token: SeDebugPrivilege 4040 Load.exe Token: SeDebugPrivilege 4444 Load.exe Token: SeDebugPrivilege 4316 Load.exe Token: SeDebugPrivilege 4424 Load.exe Token: SeDebugPrivilege 1580 Load.exe Token: SeDebugPrivilege 3360 Load.exe Token: SeDebugPrivilege 1620 Load.exe Token: SeDebugPrivilege 2248 Load.exe Token: SeDebugPrivilege 3684 Load.exe Token: SeDebugPrivilege 4548 Load.exe Token: SeDebugPrivilege 720 Load.exe Token: SeDebugPrivilege 3248 Load.exe Token: SeDebugPrivilege 2256 Load.exe Token: SeDebugPrivilege 2804 Load.exe Token: SeDebugPrivilege 1136 Load.exe Token: SeDebugPrivilege 456 Load.exe Token: SeDebugPrivilege 4472 Load.exe Token: SeDebugPrivilege 1160 Load.exe Token: SeDebugPrivilege 2560 Load.exe Token: SeDebugPrivilege 4868 Load.exe Token: SeDebugPrivilege 3772 Load.exe Token: SeDebugPrivilege 4216 Load.exe Token: SeDebugPrivilege 868 Load.exe Token: SeDebugPrivilege 4728 Load.exe Token: SeDebugPrivilege 3232 Load.exe Token: SeDebugPrivilege 4736 Load.exe Token: SeDebugPrivilege 2508 Load.exe Token: SeDebugPrivilege 4920 Load.exe Token: SeDebugPrivilege 4504 Load.exe Token: SeDebugPrivilege 1824 Load.exe Token: SeDebugPrivilege 920 Load.exe Token: SeDebugPrivilege 2776 Load.exe Token: SeDebugPrivilege 2860 Load.exe Token: SeDebugPrivilege 3468 Load.exe Token: SeDebugPrivilege 1684 Load.exe Token: SeDebugPrivilege 560 Load.exe Token: SeDebugPrivilege 2212 Load.exe Token: SeDebugPrivilege 3636 Load.exe Token: SeDebugPrivilege 2116 Load.exe Token: SeDebugPrivilege 1864 Load.exe Token: SeDebugPrivilege 3068 Load.exe Token: SeDebugPrivilege 2312 Load.exe Token: SeDebugPrivilege 2260 Load.exe Token: SeDebugPrivilege 4880 Load.exe Token: SeDebugPrivilege 2504 Load.exe Token: SeDebugPrivilege 2204 Load.exe Token: SeDebugPrivilege 3108 Load.exe Token: SeDebugPrivilege 4332 Load.exe Token: SeDebugPrivilege 2272 Load.exe Token: SeDebugPrivilege 1620 Load.exe Token: SeDebugPrivilege 1300 Load.exe Token: SeDebugPrivilege 1316 Load.exe Token: SeDebugPrivilege 2704 Load.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1992 Load.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4084 wrote to memory of 2572 4084 EU.exe 83 PID 4084 wrote to memory of 2572 4084 EU.exe 83 PID 4084 wrote to memory of 2572 4084 EU.exe 83 PID 4084 wrote to memory of 4072 4084 EU.exe 84 PID 4084 wrote to memory of 4072 4084 EU.exe 84 PID 4084 wrote to memory of 4500 4084 EU.exe 85 PID 4084 wrote to memory of 4500 4084 EU.exe 85 PID 4500 wrote to memory of 552 4500 EU.exe 86 PID 4500 wrote to memory of 552 4500 EU.exe 86 PID 4500 wrote to memory of 552 4500 EU.exe 86 PID 4500 wrote to memory of 1472 4500 EU.exe 87 PID 4500 wrote to memory of 1472 4500 EU.exe 87 PID 4500 wrote to memory of 764 4500 EU.exe 88 PID 4500 wrote to memory of 764 4500 EU.exe 88 PID 2572 wrote to memory of 3120 2572 Done.exe 89 PID 2572 wrote to memory of 3120 2572 Done.exe 89 PID 2572 wrote to memory of 3120 2572 Done.exe 89 PID 2572 wrote to memory of 2348 2572 Done.exe 90 PID 2572 wrote to memory of 2348 2572 Done.exe 90 PID 2572 wrote to memory of 2348 2572 Done.exe 90 PID 2572 wrote to memory of 2956 2572 Done.exe 93 PID 2572 wrote to memory of 2956 2572 Done.exe 93 PID 2572 wrote to memory of 2956 2572 Done.exe 93 PID 4072 wrote to memory of 2912 4072 Load.exe 94 PID 4072 wrote to memory of 2912 4072 Load.exe 94 PID 4072 wrote to memory of 2608 4072 Load.exe 96 PID 4072 wrote to memory of 2608 4072 Load.exe 96 PID 2912 wrote to memory of 1688 2912 cmd.exe 98 PID 2912 wrote to memory of 1688 2912 cmd.exe 98 PID 2608 wrote to memory of 3068 2608 cmd.exe 99 PID 2608 wrote to memory of 3068 2608 cmd.exe 99 PID 764 wrote to memory of 960 764 EU.exe 100 PID 764 wrote to memory of 960 764 EU.exe 100 PID 764 wrote to memory of 960 764 EU.exe 100 PID 764 wrote to memory of 3180 764 EU.exe 101 PID 764 wrote to memory of 3180 764 EU.exe 101 PID 764 wrote to memory of 824 764 EU.exe 102 PID 764 wrote to memory of 824 764 EU.exe 102 PID 1472 wrote to memory of 1852 1472 Load.exe 103 PID 1472 wrote to memory of 1852 1472 Load.exe 103 PID 1852 wrote to memory of 4372 1852 cmd.exe 105 PID 1852 wrote to memory of 4372 1852 cmd.exe 105 PID 1472 wrote to memory of 4572 1472 Load.exe 106 PID 1472 wrote to memory of 4572 1472 Load.exe 106 PID 4572 wrote to memory of 3760 4572 cmd.exe 110 PID 4572 wrote to memory of 3760 4572 cmd.exe 110 PID 3180 wrote to memory of 4744 3180 Load.exe 111 PID 3180 wrote to memory of 4744 3180 Load.exe 111 PID 4744 wrote to memory of 3148 4744 cmd.exe 116 PID 4744 wrote to memory of 3148 4744 cmd.exe 116 PID 824 wrote to memory of 3704 824 EU.exe 117 PID 824 wrote to memory of 3704 824 EU.exe 117 PID 824 wrote to memory of 3704 824 EU.exe 117 PID 824 wrote to memory of 1992 824 EU.exe 118 PID 824 wrote to memory of 1992 824 EU.exe 118 PID 824 wrote to memory of 3292 824 EU.exe 119 PID 824 wrote to memory of 3292 824 EU.exe 119 PID 3180 wrote to memory of 4680 3180 Load.exe 120 PID 3180 wrote to memory of 4680 3180 Load.exe 120 PID 4680 wrote to memory of 3296 4680 cmd.exe 123 PID 4680 wrote to memory of 3296 4680 cmd.exe 123 PID 4572 wrote to memory of 1508 4572 cmd.exe 124 PID 4572 wrote to memory of 1508 4572 cmd.exe 124 PID 1992 wrote to memory of 4760 1992 Load.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\ACCApi'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Local\ACCApi\apihost.exe" /st 12:58 /du 23:59 /sc daily /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2348
-
-
C:\Users\Admin\AppData\Local\ACCApi\apihost.exe"C:\Users\Admin\AppData\Local\ACCApi\apihost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Load" /tr '"C:\Users\Admin\AppData\Roaming\Load.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Load" /tr '"C:\Users\Admin\AppData\Roaming\Load.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:1688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9EA1.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:3068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Load" /tr '"C:\Users\Admin\AppData\Roaming\Load.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Load" /tr '"C:\Users\Admin\AppData\Roaming\Load.exe"'5⤵
- Scheduled Task/Job: Scheduled Task
PID:4372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA950.tmp.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\system32\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:3760
-
-
C:\Users\Admin\AppData\Roaming\Load.exe"C:\Users\Admin\AppData\Roaming\Load.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Load" /tr '"C:\Users\Admin\AppData\Roaming\Load.exe"' & exit5⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Load" /tr '"C:\Users\Admin\AppData\Roaming\Load.exe"'6⤵
- Scheduled Task/Job: Scheduled Task
PID:3148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAFF7.tmp.bat""5⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\system32\timeout.exetimeout 36⤵
- Delays execution with timeout.exe
PID:3296
-
-
C:\Users\Admin\AppData\Roaming\Load.exe"C:\Users\Admin\AppData\Roaming\Load.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Load" /tr '"C:\Users\Admin\AppData\Roaming\Load.exe"' & exit6⤵PID:4760
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Load" /tr '"C:\Users\Admin\AppData\Roaming\Load.exe"'7⤵
- Scheduled Task/Job: Scheduled Task
PID:4320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"5⤵
- Checks computer location settings
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4588
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"6⤵
- Checks computer location settings
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"7⤵
- Checks computer location settings
PID:452 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"8⤵
- Checks computer location settings
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"9⤵
- Checks computer location settings
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"10⤵
- Executes dropped EXE
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"10⤵
- Checks computer location settings
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"11⤵
- Checks computer location settings
PID:644 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3504
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"12⤵
- Checks computer location settings
PID:560 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"13⤵
- Checks computer location settings
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"14⤵
- Checks computer location settings
PID:824 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"15⤵
- Checks computer location settings
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:688
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"16⤵
- Checks computer location settings
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"17⤵
- Checks computer location settings
PID:644 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1920
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"18⤵
- Checks computer location settings
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"19⤵
- Checks computer location settings
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"20⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"21⤵
- Checks computer location settings
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"22⤵
- Checks computer location settings
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"23⤵
- Checks computer location settings
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"24⤵
- Checks computer location settings
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"25⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"26⤵
- Checks computer location settings
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4692
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"27⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"27⤵
- Checks computer location settings
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3772
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"28⤵
- Checks computer location settings
PID:812 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"29⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"29⤵
- Checks computer location settings
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3512
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"30⤵
- Checks computer location settings
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"31⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"31⤵
- Checks computer location settings
PID:468 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"32⤵
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"32⤵
- Checks computer location settings
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"33⤵
- System Location Discovery: System Language Discovery
PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"33⤵
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"33⤵
- Checks computer location settings
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"34⤵
- System Location Discovery: System Language Discovery
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"34⤵
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"34⤵
- Checks computer location settings
PID:208 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"35⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"35⤵
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"35⤵
- Checks computer location settings
PID:32 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"36⤵
- System Location Discovery: System Language Discovery
PID:4692
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"36⤵
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"36⤵
- Checks computer location settings
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"37⤵
- System Location Discovery: System Language Discovery
PID:3260
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"37⤵
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"37⤵
- Checks computer location settings
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"38⤵PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"38⤵
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"38⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"39⤵
- System Location Discovery: System Language Discovery
PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"39⤵
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"39⤵
- Checks computer location settings
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"40⤵
- System Location Discovery: System Language Discovery
PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"40⤵
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"40⤵
- Checks computer location settings
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"41⤵
- System Location Discovery: System Language Discovery
PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"41⤵
- Checks computer location settings
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"42⤵
- System Location Discovery: System Language Discovery
PID:1132
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"42⤵
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"42⤵
- Checks computer location settings
PID:960 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"43⤵
- System Location Discovery: System Language Discovery
PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"43⤵
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"43⤵
- Checks computer location settings
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"44⤵
- System Location Discovery: System Language Discovery
PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"44⤵
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"44⤵
- Checks computer location settings
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"45⤵
- System Location Discovery: System Language Discovery
PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"45⤵
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"45⤵
- Checks computer location settings
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"46⤵
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"46⤵
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"46⤵
- Checks computer location settings
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"47⤵
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"47⤵
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"47⤵
- Checks computer location settings
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"48⤵
- System Location Discovery: System Language Discovery
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"48⤵
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"48⤵
- Checks computer location settings
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"49⤵
- System Location Discovery: System Language Discovery
PID:4200
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"49⤵
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"49⤵
- Checks computer location settings
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"50⤵
- System Location Discovery: System Language Discovery
PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"50⤵
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"50⤵
- Checks computer location settings
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"51⤵PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"51⤵
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"51⤵
- Checks computer location settings
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"52⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"52⤵
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"52⤵
- Checks computer location settings
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"53⤵
- System Location Discovery: System Language Discovery
PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"53⤵
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"53⤵
- Checks computer location settings
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"54⤵
- System Location Discovery: System Language Discovery
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"54⤵
- Suspicious use of AdjustPrivilegeToken
PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"54⤵
- Checks computer location settings
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"55⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"55⤵
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"55⤵
- Checks computer location settings
PID:776 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"56⤵
- System Location Discovery: System Language Discovery
PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"56⤵
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"56⤵
- Checks computer location settings
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"57⤵
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"57⤵
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"57⤵
- Checks computer location settings
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"58⤵
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"58⤵
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"58⤵
- Checks computer location settings
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"59⤵
- System Location Discovery: System Language Discovery
PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"59⤵
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"59⤵
- Checks computer location settings
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"60⤵
- System Location Discovery: System Language Discovery
PID:3308
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"60⤵
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"60⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"61⤵
- System Location Discovery: System Language Discovery
PID:4540
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"61⤵PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"61⤵
- Checks computer location settings
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"62⤵
- System Location Discovery: System Language Discovery
PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"62⤵PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"62⤵
- Checks computer location settings
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"63⤵
- System Location Discovery: System Language Discovery
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"63⤵PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"63⤵
- Checks computer location settings
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"64⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"64⤵PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"64⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\Done.exe"C:\Users\Admin\AppData\Local\Temp\Done.exe"65⤵
- System Location Discovery: System Language Discovery
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"65⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\EU.exe"C:\Users\Admin\AppData\Local\Temp\EU.exe"65⤵PID:1460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
410B
MD53bbb825ef1319deb378787046587112b
SHA167da95f0031be525b4cf10645632ca34d66b913b
SHA256d9c6d00fad02f7a9ef0fcddc298ffd58b17020fb12b1336d5733237cbfadb1e0
SHA5127771ae543e188d544e1bb6c65e0453a6777c1c39790a355f4cce652a815bfaf94dd426de3db910a67bd06e463ac0143d9e2ca44d2b12af7f0d84c27b4a09cc54
-
Filesize
69KB
MD52453fa8ef7ccc79cada8679f06f2be53
SHA1b3db41bc85d300a069e6636b5c9e7dcf0a6a95b2
SHA256e0e329ca03adcd56c5ff4a5cbdaff475a1cf636dfce64b7da1a05f5c74daac88
SHA512a28398843232745153b3f57d2166aca95e9f930a8334c0ffdb2db192fc8cc8b2d5f5a0a0d123a996f2aa738668209a3541ffb9ed6f42f665aefb9300cd3d45d4
-
Filesize
74KB
MD54fc5086bcb8939429aea99f7322e619b
SHA18d3bd7d005710a8ae0bd0143d18b437be20018d7
SHA256e31d6dc4d6f89573321f389c5b3f12838545ff8d2f1380cfba1782d39853e9fd
SHA51204e230f5b39356aecf4732ac9a2f4fea96e51018907e2f22c7e3f22e51188b64cdb3e202fe324f5e3500761fae43f898bf9489aa8faa34eff3566e1119a786d2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
148B
MD53addf17981a89ebdab7d4ea7118d6992
SHA18b6522000dfb6f1de6e18ce3aa30b8c4ecb02b74
SHA25659e0d9d902bc26ed8e4ea83c8ebe1e5da1135890b4b45dcc4b52583a7eae28db
SHA512a6133c07b2bdb480703b7b1e5198384b1b50ce6f802cc39494a33f972458fac92e5284d08ae981fbd21d70393c802212c6b108490005fb0dd31e3f158cd1e4d1
-
Filesize
148B
MD5c65356ea328652fa24525fa9d9c7b6b8
SHA1756b4b99de1115c28184a3c82f4a5988b366fc07
SHA25611d477b300d5626d2b4486d5a12f60858e4aca0ec9a6b5a49d7ebee38ad4ad47
SHA5121a5da6353b22563dcfbccae6825b6664eab4090c663298f783c916f2150b73fbf27f6878150db3839b1682918959bfac040e87bb8d1d6725663d3fb871d79246
-
Filesize
148B
MD5489c9942ea28127d9de853ec2b2cecdd
SHA1cec2f2f6bc9bb535c96f2800bf68d96c6ffb6662
SHA2566068a0c738df3a25ad0496e1f77ed1c665ebc341e5b5ea7ca8ff0565611bd967
SHA5123438dc7c81f2bed9102451dc4078a7942dafd38b736e891f0932f2542fbd8c98e49cb1f0e40f85d575a7adc65c0974cb0c1900d50460fe1bf14ab0876b3dcf79
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b