Overview
overview
10Static
static
53666991ba9...23.exe
windows7-x64
73666991ba9...23.exe
windows10-2004-x64
7375aead107...8a.exe
windows7-x64
7375aead107...8a.exe
windows10-2004-x64
73a55a5e059...66.exe
windows7-x64
53a55a5e059...66.exe
windows10-2004-x64
53a5c360865...0a.exe
windows7-x64
53a5c360865...0a.exe
windows10-2004-x64
53a8196dc93...03.exe
windows7-x64
53a8196dc93...03.exe
windows10-2004-x64
53b2e4fc5bb...0c.exe
windows7-x64
53b2e4fc5bb...0c.exe
windows10-2004-x64
53c81cd2032...fe.exe
windows7-x64
103c81cd2032...fe.exe
windows10-2004-x64
103d134d4900...24.exe
windows7-x64
103d134d4900...24.exe
windows10-2004-x64
103fe4c784df...64.exe
windows7-x64
53fe4c784df...64.exe
windows10-2004-x64
540f9a44672...69.exe
windows7-x64
1040f9a44672...69.exe
windows10-2004-x64
10417d576bf1...b0.exe
windows7-x64
5417d576bf1...b0.exe
windows10-2004-x64
541ac704c7b...ad.exe
windows7-x64
741ac704c7b...ad.exe
windows10-2004-x64
742a09e7356...2c.exe
windows7-x64
1042a09e7356...2c.exe
windows10-2004-x64
1044b1b50b00...7f.exe
windows7-x64
544b1b50b00...7f.exe
windows10-2004-x64
5450fcf9d11...04.exe
windows7-x64
5450fcf9d11...04.exe
windows10-2004-x64
546836f3afb...d5.exe
windows7-x64
646836f3afb...d5.exe
windows10-2004-x64
6Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 07:24
Behavioral task
behavioral1
Sample
3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
375aead10728ec8de6d9f6e13a1bdb21563385fca54f367370057144f219488a.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
375aead10728ec8de6d9f6e13a1bdb21563385fca54f367370057144f219488a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
3a55a5e05993d9369c5c407f00e05e235b39c45aba71fa25c6618827e767fa66.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
3a55a5e05993d9369c5c407f00e05e235b39c45aba71fa25c6618827e767fa66.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
3a5c36086501b5a824f31f57103d9b137636f8e0b4f2d60291359b18d574060a.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
3a5c36086501b5a824f31f57103d9b137636f8e0b4f2d60291359b18d574060a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
3a8196dc93da2c2e2a9515cbc5ff7e47d679e04ce51957551ebabc6496cc3103.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
3a8196dc93da2c2e2a9515cbc5ff7e47d679e04ce51957551ebabc6496cc3103.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
3b2e4fc5bb057a461d0688b737c7e6f69d41563f732fec265564331036efdf0c.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
3b2e4fc5bb057a461d0688b737c7e6f69d41563f732fec265564331036efdf0c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
3c81cd20323c282181d40fa0e8ab7b66dfd46edd7bafc3d6abeb072420b314fe.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
3c81cd20323c282181d40fa0e8ab7b66dfd46edd7bafc3d6abeb072420b314fe.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
3d134d49001a39cd3a83cc3983943d567b1393415ddfaf88c2accac2f3756124.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
3d134d49001a39cd3a83cc3983943d567b1393415ddfaf88c2accac2f3756124.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
3fe4c784dfb841053360622561788dacfc8e4b81567bc461e4cd33e61d2d1e64.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
3fe4c784dfb841053360622561788dacfc8e4b81567bc461e4cd33e61d2d1e64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
40f9a446728e079ce7f1b7b8cd6a6f2ff82e4fb22d209ae9576f178612d35369.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
40f9a446728e079ce7f1b7b8cd6a6f2ff82e4fb22d209ae9576f178612d35369.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
42a09e735691f947b7cc6d8f9a9cebbf9e87ac1fc2cbd0a4f0aa2b1b9eb4262c.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
42a09e735691f947b7cc6d8f9a9cebbf9e87ac1fc2cbd0a4f0aa2b1b9eb4262c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
450fcf9d115867ad23b3436808e43bcf3a3f77325124ca1835851644fd486a04.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
450fcf9d115867ad23b3436808e43bcf3a3f77325124ca1835851644fd486a04.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
46836f3afb222bd150f0fe58f9d0019fd341544b2101a2e44c52bbd02a2dacd5.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
46836f3afb222bd150f0fe58f9d0019fd341544b2101a2e44c52bbd02a2dacd5.exe
Resource
win10v2004-20241007-en
General
-
Target
41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe
-
Size
740KB
-
MD5
1ff326b327dfb16c932fe4d904f4ccf7
-
SHA1
a3b7a53df4e9c4125ab6c03c8d1e50204cf0ff9f
-
SHA256
41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad
-
SHA512
b717f440a35e4687fbc7b3024d7de8c1f6eb55ad026a798b076572f267d49585d3cbdb572678f64e4512f5f2672813c493d01f78621c9bb57b72ce27db165713
-
SSDEEP
12288:5sHzOUNUSB/o5LsI1uwajJ5yvv1l27rzUEX5ENgcGCXfkUg9vfopCHm3If3/8xLE:giUmSB/o5d1ubcvMX5UgcXyfop0v8xLE
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 64 IoCs
pid Process 2352 name.exe 2820 name.exe 2808 name.exe 2568 name.exe 1936 name.exe 2892 name.exe 684 name.exe 1612 name.exe 3016 name.exe 2256 name.exe 2880 name.exe 2668 name.exe 924 name.exe 1348 name.exe 2432 name.exe 2344 name.exe 2400 name.exe 1668 name.exe 2260 name.exe 2664 name.exe 2768 name.exe 1700 name.exe 400 name.exe 1564 name.exe 1920 name.exe 764 name.exe 1636 name.exe 2656 name.exe 2476 name.exe 3024 name.exe 648 name.exe 2040 name.exe 1532 name.exe 2244 name.exe 348 name.exe 2468 name.exe 2320 name.exe 2652 name.exe 2816 name.exe 2728 name.exe 2732 name.exe 1224 name.exe 1744 name.exe 1508 name.exe 548 name.exe 2904 name.exe 2108 name.exe 444 name.exe 276 name.exe 1940 name.exe 1756 name.exe 1740 name.exe 2120 name.exe 2136 name.exe 2072 name.exe 2788 name.exe 2936 name.exe 2584 name.exe 1460 name.exe 1980 name.exe 1876 name.exe 1240 name.exe 2176 name.exe 2224 name.exe -
Loads dropped DLL 2 IoCs
pid Process 2520 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 2352 name.exe -
AutoIT Executable 64 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral23/memory/2352-22-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2520-21-0x0000000000DA0000-0x0000000000F3F000-memory.dmp autoit_exe behavioral23/memory/2352-41-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2808-60-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2820-59-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2808-77-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2568-94-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1936-112-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2892-129-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/684-131-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/684-148-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1612-166-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/3016-184-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2880-202-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2256-201-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2880-219-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2668-237-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/924-238-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/924-255-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2432-273-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1348-272-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2432-290-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2400-308-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2344-307-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2400-325-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2260-344-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1668-343-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2260-361-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2664-379-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2768-393-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1700-407-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/400-408-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/400-422-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1564-436-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1920-449-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/764-463-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1636-464-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1636-478-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2656-492-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2476-506-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/3024-520-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/648-535-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2040-549-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1532-564-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2244-578-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/348-593-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2468-607-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2656-623-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2320-622-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2652-638-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2816-639-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2816-653-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2728-667-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2732-681-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1224-695-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1744-696-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1744-710-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1508-723-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/548-737-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2904-751-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/2108-765-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/444-779-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/276-793-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe behavioral23/memory/1940-808-0x0000000000B30000-0x0000000000CCF000-memory.dmp autoit_exe -
resource yara_rule behavioral23/memory/2520-0-0x0000000000DA0000-0x0000000000F3F000-memory.dmp upx behavioral23/files/0x000400000001cde0-15.dat upx behavioral23/memory/2520-17-0x0000000002B10000-0x0000000002CAF000-memory.dmp upx behavioral23/memory/2352-22-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2520-21-0x0000000000DA0000-0x0000000000F3F000-memory.dmp upx behavioral23/memory/2352-41-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2808-60-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2820-59-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2808-77-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2568-94-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/1936-95-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2892-113-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/1936-112-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2892-129-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/684-131-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/684-148-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/1612-149-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/1612-166-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/3016-167-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/3016-184-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2880-202-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2256-201-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2668-220-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2880-219-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2668-237-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/924-238-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/924-255-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2432-273-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/1348-272-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2432-290-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2400-308-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2344-307-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/1668-326-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2400-325-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2260-344-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/1668-343-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2664-362-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2260-361-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2664-379-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2768-393-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/1700-407-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/400-408-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/400-422-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/1564-436-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/1920-449-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/764-463-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/1636-464-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/1636-478-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2656-479-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2476-493-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2656-492-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2476-506-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/3024-520-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/648-521-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/648-535-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/1532-550-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2040-549-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/1532-564-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/348-579-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2244-578-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/348-593-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2320-608-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2468-607-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx behavioral23/memory/2652-624-0x0000000000B30000-0x0000000000CCF000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2520 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 2520 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 2352 name.exe 2352 name.exe 2820 name.exe 2820 name.exe 2808 name.exe 2808 name.exe 2568 name.exe 2568 name.exe 1936 name.exe 1936 name.exe 2892 name.exe 2892 name.exe 684 name.exe 684 name.exe 1612 name.exe 1612 name.exe 3016 name.exe 3016 name.exe 2256 name.exe 2256 name.exe 2880 name.exe 2880 name.exe 2668 name.exe 2668 name.exe 924 name.exe 924 name.exe 1348 name.exe 1348 name.exe 2432 name.exe 2432 name.exe 2344 name.exe 2344 name.exe 2400 name.exe 2400 name.exe 1668 name.exe 1668 name.exe 2260 name.exe 2260 name.exe 2664 name.exe 2664 name.exe 2768 name.exe 2768 name.exe 1700 name.exe 1700 name.exe 400 name.exe 400 name.exe 1564 name.exe 1564 name.exe 1920 name.exe 1920 name.exe 764 name.exe 764 name.exe 1636 name.exe 1636 name.exe 2656 name.exe 2656 name.exe 2476 name.exe 2476 name.exe 3024 name.exe 3024 name.exe 648 name.exe 648 name.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2520 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 2520 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 2352 name.exe 2352 name.exe 2820 name.exe 2820 name.exe 2808 name.exe 2808 name.exe 2568 name.exe 2568 name.exe 1936 name.exe 1936 name.exe 2892 name.exe 2892 name.exe 684 name.exe 684 name.exe 1612 name.exe 1612 name.exe 3016 name.exe 3016 name.exe 2256 name.exe 2256 name.exe 2880 name.exe 2880 name.exe 2668 name.exe 2668 name.exe 924 name.exe 924 name.exe 1348 name.exe 1348 name.exe 2432 name.exe 2432 name.exe 2344 name.exe 2344 name.exe 2400 name.exe 2400 name.exe 1668 name.exe 1668 name.exe 2260 name.exe 2260 name.exe 2664 name.exe 2664 name.exe 2768 name.exe 2768 name.exe 1700 name.exe 1700 name.exe 400 name.exe 400 name.exe 1564 name.exe 1564 name.exe 1920 name.exe 1920 name.exe 764 name.exe 764 name.exe 1636 name.exe 1636 name.exe 2656 name.exe 2656 name.exe 2476 name.exe 2476 name.exe 3024 name.exe 3024 name.exe 648 name.exe 648 name.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2352 2520 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 31 PID 2520 wrote to memory of 2352 2520 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 31 PID 2520 wrote to memory of 2352 2520 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 31 PID 2520 wrote to memory of 2352 2520 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 31 PID 2352 wrote to memory of 2820 2352 name.exe 32 PID 2352 wrote to memory of 2820 2352 name.exe 32 PID 2352 wrote to memory of 2820 2352 name.exe 32 PID 2352 wrote to memory of 2820 2352 name.exe 32 PID 2820 wrote to memory of 2808 2820 name.exe 33 PID 2820 wrote to memory of 2808 2820 name.exe 33 PID 2820 wrote to memory of 2808 2820 name.exe 33 PID 2820 wrote to memory of 2808 2820 name.exe 33 PID 2808 wrote to memory of 2568 2808 name.exe 34 PID 2808 wrote to memory of 2568 2808 name.exe 34 PID 2808 wrote to memory of 2568 2808 name.exe 34 PID 2808 wrote to memory of 2568 2808 name.exe 34 PID 2568 wrote to memory of 1936 2568 name.exe 35 PID 2568 wrote to memory of 1936 2568 name.exe 35 PID 2568 wrote to memory of 1936 2568 name.exe 35 PID 2568 wrote to memory of 1936 2568 name.exe 35 PID 1936 wrote to memory of 2892 1936 name.exe 36 PID 1936 wrote to memory of 2892 1936 name.exe 36 PID 1936 wrote to memory of 2892 1936 name.exe 36 PID 1936 wrote to memory of 2892 1936 name.exe 36 PID 2892 wrote to memory of 684 2892 name.exe 37 PID 2892 wrote to memory of 684 2892 name.exe 37 PID 2892 wrote to memory of 684 2892 name.exe 37 PID 2892 wrote to memory of 684 2892 name.exe 37 PID 684 wrote to memory of 1612 684 name.exe 38 PID 684 wrote to memory of 1612 684 name.exe 38 PID 684 wrote to memory of 1612 684 name.exe 38 PID 684 wrote to memory of 1612 684 name.exe 38 PID 1612 wrote to memory of 3016 1612 name.exe 39 PID 1612 wrote to memory of 3016 1612 name.exe 39 PID 1612 wrote to memory of 3016 1612 name.exe 39 PID 1612 wrote to memory of 3016 1612 name.exe 39 PID 3016 wrote to memory of 2256 3016 name.exe 40 PID 3016 wrote to memory of 2256 3016 name.exe 40 PID 3016 wrote to memory of 2256 3016 name.exe 40 PID 3016 wrote to memory of 2256 3016 name.exe 40 PID 2256 wrote to memory of 2880 2256 name.exe 41 PID 2256 wrote to memory of 2880 2256 name.exe 41 PID 2256 wrote to memory of 2880 2256 name.exe 41 PID 2256 wrote to memory of 2880 2256 name.exe 41 PID 2880 wrote to memory of 2668 2880 name.exe 42 PID 2880 wrote to memory of 2668 2880 name.exe 42 PID 2880 wrote to memory of 2668 2880 name.exe 42 PID 2880 wrote to memory of 2668 2880 name.exe 42 PID 2668 wrote to memory of 924 2668 name.exe 43 PID 2668 wrote to memory of 924 2668 name.exe 43 PID 2668 wrote to memory of 924 2668 name.exe 43 PID 2668 wrote to memory of 924 2668 name.exe 43 PID 924 wrote to memory of 1348 924 name.exe 44 PID 924 wrote to memory of 1348 924 name.exe 44 PID 924 wrote to memory of 1348 924 name.exe 44 PID 924 wrote to memory of 1348 924 name.exe 44 PID 1348 wrote to memory of 2432 1348 name.exe 45 PID 1348 wrote to memory of 2432 1348 name.exe 45 PID 1348 wrote to memory of 2432 1348 name.exe 45 PID 1348 wrote to memory of 2432 1348 name.exe 45 PID 2432 wrote to memory of 2344 2432 name.exe 46 PID 2432 wrote to memory of 2344 2432 name.exe 46 PID 2432 wrote to memory of 2344 2432 name.exe 46 PID 2432 wrote to memory of 2344 2432 name.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe"C:\Users\Admin\AppData\Local\Temp\41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"6⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"7⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"10⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"13⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"14⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"16⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2344 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2400 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1668 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2260 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"21⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2664 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2768 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"23⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1700 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"24⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:400 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1564 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"26⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1920 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"27⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:764 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"28⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1636 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"29⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2656 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"30⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2476 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"31⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3024 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:648 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"33⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"34⤵
- Executes dropped EXE
PID:1532 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"35⤵
- Executes dropped EXE
PID:2244 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"36⤵
- Executes dropped EXE
PID:348 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"38⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"39⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"40⤵
- Executes dropped EXE
PID:2816 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"41⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"43⤵
- Executes dropped EXE
PID:1224 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"45⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"46⤵
- Executes dropped EXE
PID:548 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"47⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"48⤵
- Executes dropped EXE
PID:2108 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"49⤵
- Executes dropped EXE
PID:444 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:276 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"53⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"55⤵
- Executes dropped EXE
PID:2136 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"57⤵
- Executes dropped EXE
PID:2788 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"58⤵
- Executes dropped EXE
PID:2936 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"59⤵
- Executes dropped EXE
PID:2584 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1460 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"61⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1240 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"66⤵PID:976
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"67⤵
- System Location Discovery: System Language Discovery
PID:1416 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"68⤵PID:1836
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"69⤵
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"70⤵
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"71⤵PID:1956
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"72⤵
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"73⤵PID:2812
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"74⤵
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"75⤵PID:2932
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"76⤵PID:1572
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"77⤵PID:536
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"78⤵
- System Location Discovery: System Language Discovery
PID:1280 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"79⤵PID:1620
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"80⤵PID:2536
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"81⤵PID:2104
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"82⤵PID:2304
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"83⤵
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"84⤵PID:1524
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"85⤵PID:1820
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"86⤵PID:1628
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"87⤵
- System Location Discovery: System Language Discovery
PID:2016 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"88⤵PID:2092
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"89⤵PID:2076
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"90⤵
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"91⤵
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"92⤵PID:2564
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"93⤵
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"94⤵
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"95⤵PID:2324
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"96⤵PID:860
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"97⤵PID:352
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"98⤵
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"99⤵PID:1976
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"100⤵PID:996
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"101⤵
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"102⤵PID:2712
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"103⤵PID:2724
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"104⤵PID:2088
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"105⤵PID:2864
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"106⤵
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"107⤵PID:1032
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"108⤵PID:2116
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"109⤵PID:768
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"110⤵PID:1312
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"111⤵
- System Location Discovery: System Language Discovery
PID:1828 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"112⤵
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"113⤵PID:2100
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"114⤵PID:1556
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"115⤵PID:2592
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"116⤵
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"117⤵
- System Location Discovery: System Language Discovery
PID:716 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"118⤵PID:1788
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"119⤵
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"120⤵PID:2756
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"121⤵PID:1352
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"122⤵
- System Location Discovery: System Language Discovery
PID:2096
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-