Overview
overview
10Static
static
53666991ba9...23.exe
windows7-x64
73666991ba9...23.exe
windows10-2004-x64
7375aead107...8a.exe
windows7-x64
7375aead107...8a.exe
windows10-2004-x64
73a55a5e059...66.exe
windows7-x64
53a55a5e059...66.exe
windows10-2004-x64
53a5c360865...0a.exe
windows7-x64
53a5c360865...0a.exe
windows10-2004-x64
53a8196dc93...03.exe
windows7-x64
53a8196dc93...03.exe
windows10-2004-x64
53b2e4fc5bb...0c.exe
windows7-x64
53b2e4fc5bb...0c.exe
windows10-2004-x64
53c81cd2032...fe.exe
windows7-x64
103c81cd2032...fe.exe
windows10-2004-x64
103d134d4900...24.exe
windows7-x64
103d134d4900...24.exe
windows10-2004-x64
103fe4c784df...64.exe
windows7-x64
53fe4c784df...64.exe
windows10-2004-x64
540f9a44672...69.exe
windows7-x64
1040f9a44672...69.exe
windows10-2004-x64
10417d576bf1...b0.exe
windows7-x64
5417d576bf1...b0.exe
windows10-2004-x64
541ac704c7b...ad.exe
windows7-x64
741ac704c7b...ad.exe
windows10-2004-x64
742a09e7356...2c.exe
windows7-x64
1042a09e7356...2c.exe
windows10-2004-x64
1044b1b50b00...7f.exe
windows7-x64
544b1b50b00...7f.exe
windows10-2004-x64
5450fcf9d11...04.exe
windows7-x64
5450fcf9d11...04.exe
windows10-2004-x64
546836f3afb...d5.exe
windows7-x64
646836f3afb...d5.exe
windows10-2004-x64
6Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 07:24
Behavioral task
behavioral1
Sample
3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
375aead10728ec8de6d9f6e13a1bdb21563385fca54f367370057144f219488a.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
375aead10728ec8de6d9f6e13a1bdb21563385fca54f367370057144f219488a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
3a55a5e05993d9369c5c407f00e05e235b39c45aba71fa25c6618827e767fa66.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
3a55a5e05993d9369c5c407f00e05e235b39c45aba71fa25c6618827e767fa66.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
3a5c36086501b5a824f31f57103d9b137636f8e0b4f2d60291359b18d574060a.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
3a5c36086501b5a824f31f57103d9b137636f8e0b4f2d60291359b18d574060a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
3a8196dc93da2c2e2a9515cbc5ff7e47d679e04ce51957551ebabc6496cc3103.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
3a8196dc93da2c2e2a9515cbc5ff7e47d679e04ce51957551ebabc6496cc3103.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
3b2e4fc5bb057a461d0688b737c7e6f69d41563f732fec265564331036efdf0c.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
3b2e4fc5bb057a461d0688b737c7e6f69d41563f732fec265564331036efdf0c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
3c81cd20323c282181d40fa0e8ab7b66dfd46edd7bafc3d6abeb072420b314fe.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
3c81cd20323c282181d40fa0e8ab7b66dfd46edd7bafc3d6abeb072420b314fe.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
3d134d49001a39cd3a83cc3983943d567b1393415ddfaf88c2accac2f3756124.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
3d134d49001a39cd3a83cc3983943d567b1393415ddfaf88c2accac2f3756124.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
3fe4c784dfb841053360622561788dacfc8e4b81567bc461e4cd33e61d2d1e64.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
3fe4c784dfb841053360622561788dacfc8e4b81567bc461e4cd33e61d2d1e64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
40f9a446728e079ce7f1b7b8cd6a6f2ff82e4fb22d209ae9576f178612d35369.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
40f9a446728e079ce7f1b7b8cd6a6f2ff82e4fb22d209ae9576f178612d35369.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
42a09e735691f947b7cc6d8f9a9cebbf9e87ac1fc2cbd0a4f0aa2b1b9eb4262c.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
42a09e735691f947b7cc6d8f9a9cebbf9e87ac1fc2cbd0a4f0aa2b1b9eb4262c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
450fcf9d115867ad23b3436808e43bcf3a3f77325124ca1835851644fd486a04.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
450fcf9d115867ad23b3436808e43bcf3a3f77325124ca1835851644fd486a04.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
46836f3afb222bd150f0fe58f9d0019fd341544b2101a2e44c52bbd02a2dacd5.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
46836f3afb222bd150f0fe58f9d0019fd341544b2101a2e44c52bbd02a2dacd5.exe
Resource
win10v2004-20241007-en
General
-
Target
41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe
-
Size
740KB
-
MD5
1ff326b327dfb16c932fe4d904f4ccf7
-
SHA1
a3b7a53df4e9c4125ab6c03c8d1e50204cf0ff9f
-
SHA256
41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad
-
SHA512
b717f440a35e4687fbc7b3024d7de8c1f6eb55ad026a798b076572f267d49585d3cbdb572678f64e4512f5f2672813c493d01f78621c9bb57b72ce27db165713
-
SSDEEP
12288:5sHzOUNUSB/o5LsI1uwajJ5yvv1l27rzUEX5ENgcGCXfkUg9vfopCHm3If3/8xLE:giUmSB/o5d1ubcvMX5UgcXyfop0v8xLE
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 64 IoCs
pid Process 2712 name.exe 2168 name.exe 1728 name.exe 3836 name.exe 3164 name.exe 1560 name.exe 216 name.exe 3864 name.exe 2072 name.exe 1552 name.exe 2628 name.exe 4488 name.exe 4724 name.exe 4468 name.exe 1804 name.exe 1240 name.exe 3224 name.exe 2552 name.exe 4044 name.exe 2944 name.exe 2976 name.exe 60 name.exe 388 name.exe 3304 name.exe 384 name.exe 2208 name.exe 1604 name.exe 3120 name.exe 4988 name.exe 4776 name.exe 3716 name.exe 4868 name.exe 4088 name.exe 1192 name.exe 4196 name.exe 3968 name.exe 1080 name.exe 2256 name.exe 2000 name.exe 1504 name.exe 1408 name.exe 4036 name.exe 3128 name.exe 1284 name.exe 1020 name.exe 4400 name.exe 4676 name.exe 5028 name.exe 4672 name.exe 2660 name.exe 4052 name.exe 4000 name.exe 4424 name.exe 3260 name.exe 4300 name.exe 4760 name.exe 1224 name.exe 2416 name.exe 3640 name.exe 3356 name.exe 4604 name.exe 3048 name.exe 740 name.exe 408 name.exe -
AutoIT Executable 64 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral24/memory/4884-20-0x0000000000620000-0x00000000007BF000-memory.dmp autoit_exe behavioral24/memory/2712-40-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/2168-58-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/1728-76-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/3836-93-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/3164-111-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/1560-129-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/216-147-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/3864-165-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/2072-183-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/1552-202-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/2628-220-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4488-238-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4724-256-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4468-274-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/1804-292-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/1240-310-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/3224-328-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/2552-345-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4044-363-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/2944-381-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/2976-398-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/60-413-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/388-428-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/3304-429-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/3304-444-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/384-458-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/2208-473-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/1604-489-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/3120-504-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4988-519-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4776-520-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4776-535-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/3716-550-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4868-565-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4088-580-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/1192-595-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4196-610-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/3968-626-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/1080-641-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/2256-656-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/2000-670-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/1504-685-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/1408-700-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4036-715-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/3128-730-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/1284-745-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/1020-746-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/1020-761-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4400-776-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4676-791-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/5028-807-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4672-822-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/2660-837-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4052-852-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4000-867-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4424-882-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/3260-897-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4300-912-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/4760-927-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/1224-942-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/2416-957-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/3640-972-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe behavioral24/memory/3356-987-0x0000000000AA0000-0x0000000000C3F000-memory.dmp autoit_exe -
resource yara_rule behavioral24/memory/4884-0-0x0000000000620000-0x00000000007BF000-memory.dmp upx behavioral24/files/0x0008000000023d18-17.dat upx behavioral24/memory/4884-20-0x0000000000620000-0x00000000007BF000-memory.dmp upx behavioral24/memory/2712-18-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/2712-40-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/2168-58-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1728-76-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/3836-93-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/3164-111-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1560-129-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/216-147-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/3864-165-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1552-184-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/2072-183-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1552-202-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/2628-220-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4488-238-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4724-256-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4468-274-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1804-292-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1240-310-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/3224-328-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/2552-345-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4044-363-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/2944-381-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/2976-398-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/60-413-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/388-428-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/3304-429-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/3304-444-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/384-458-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/2208-473-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1604-474-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1604-489-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/3120-504-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4988-519-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4776-520-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4776-535-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/3716-550-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4868-565-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4088-580-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1192-595-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4196-610-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/3968-611-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/3968-626-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1080-641-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/2256-656-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/2000-670-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1504-685-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1408-700-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4036-715-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/3128-730-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1284-745-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1020-746-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/1020-761-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4400-776-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4676-791-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/5028-792-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/5028-807-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4672-822-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/2660-837-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4052-852-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4000-867-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx behavioral24/memory/4424-882-0x0000000000AA0000-0x0000000000C3F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4884 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 4884 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 4884 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 2712 name.exe 2712 name.exe 2168 name.exe 2168 name.exe 1728 name.exe 1728 name.exe 3836 name.exe 3836 name.exe 3164 name.exe 3164 name.exe 1560 name.exe 1560 name.exe 216 name.exe 216 name.exe 3864 name.exe 3864 name.exe 2072 name.exe 2072 name.exe 1552 name.exe 1552 name.exe 2628 name.exe 2628 name.exe 4488 name.exe 4488 name.exe 4724 name.exe 4724 name.exe 4468 name.exe 4468 name.exe 1804 name.exe 1804 name.exe 1240 name.exe 1240 name.exe 3224 name.exe 3224 name.exe 2552 name.exe 2552 name.exe 4044 name.exe 4044 name.exe 2944 name.exe 2944 name.exe 2976 name.exe 2976 name.exe 60 name.exe 60 name.exe 388 name.exe 388 name.exe 3304 name.exe 3304 name.exe 384 name.exe 384 name.exe 2208 name.exe 2208 name.exe 1604 name.exe 1604 name.exe 3120 name.exe 3120 name.exe 4988 name.exe 4988 name.exe 4776 name.exe 4776 name.exe 3716 name.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4884 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 4884 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 4884 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 2712 name.exe 2712 name.exe 2168 name.exe 2168 name.exe 1728 name.exe 1728 name.exe 3836 name.exe 3836 name.exe 3164 name.exe 3164 name.exe 1560 name.exe 1560 name.exe 216 name.exe 216 name.exe 3864 name.exe 3864 name.exe 2072 name.exe 2072 name.exe 1552 name.exe 1552 name.exe 2628 name.exe 2628 name.exe 4488 name.exe 4488 name.exe 4724 name.exe 4724 name.exe 4468 name.exe 4468 name.exe 1804 name.exe 1804 name.exe 1240 name.exe 1240 name.exe 3224 name.exe 3224 name.exe 2552 name.exe 2552 name.exe 4044 name.exe 4044 name.exe 2944 name.exe 2944 name.exe 2976 name.exe 2976 name.exe 60 name.exe 60 name.exe 388 name.exe 388 name.exe 3304 name.exe 3304 name.exe 384 name.exe 384 name.exe 2208 name.exe 2208 name.exe 1604 name.exe 1604 name.exe 3120 name.exe 3120 name.exe 4988 name.exe 4988 name.exe 4776 name.exe 4776 name.exe 3716 name.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4884 wrote to memory of 2712 4884 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 83 PID 4884 wrote to memory of 2712 4884 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 83 PID 4884 wrote to memory of 2712 4884 41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe 83 PID 2712 wrote to memory of 2168 2712 name.exe 84 PID 2712 wrote to memory of 2168 2712 name.exe 84 PID 2712 wrote to memory of 2168 2712 name.exe 84 PID 2168 wrote to memory of 1728 2168 name.exe 85 PID 2168 wrote to memory of 1728 2168 name.exe 85 PID 2168 wrote to memory of 1728 2168 name.exe 85 PID 1728 wrote to memory of 3836 1728 name.exe 86 PID 1728 wrote to memory of 3836 1728 name.exe 86 PID 1728 wrote to memory of 3836 1728 name.exe 86 PID 3836 wrote to memory of 3164 3836 name.exe 87 PID 3836 wrote to memory of 3164 3836 name.exe 87 PID 3836 wrote to memory of 3164 3836 name.exe 87 PID 3164 wrote to memory of 1560 3164 name.exe 88 PID 3164 wrote to memory of 1560 3164 name.exe 88 PID 3164 wrote to memory of 1560 3164 name.exe 88 PID 1560 wrote to memory of 216 1560 name.exe 89 PID 1560 wrote to memory of 216 1560 name.exe 89 PID 1560 wrote to memory of 216 1560 name.exe 89 PID 216 wrote to memory of 3864 216 name.exe 90 PID 216 wrote to memory of 3864 216 name.exe 90 PID 216 wrote to memory of 3864 216 name.exe 90 PID 3864 wrote to memory of 2072 3864 name.exe 91 PID 3864 wrote to memory of 2072 3864 name.exe 91 PID 3864 wrote to memory of 2072 3864 name.exe 91 PID 2072 wrote to memory of 1552 2072 name.exe 92 PID 2072 wrote to memory of 1552 2072 name.exe 92 PID 2072 wrote to memory of 1552 2072 name.exe 92 PID 1552 wrote to memory of 2628 1552 name.exe 93 PID 1552 wrote to memory of 2628 1552 name.exe 93 PID 1552 wrote to memory of 2628 1552 name.exe 93 PID 2628 wrote to memory of 4488 2628 name.exe 94 PID 2628 wrote to memory of 4488 2628 name.exe 94 PID 2628 wrote to memory of 4488 2628 name.exe 94 PID 4488 wrote to memory of 4724 4488 name.exe 95 PID 4488 wrote to memory of 4724 4488 name.exe 95 PID 4488 wrote to memory of 4724 4488 name.exe 95 PID 4724 wrote to memory of 4468 4724 name.exe 96 PID 4724 wrote to memory of 4468 4724 name.exe 96 PID 4724 wrote to memory of 4468 4724 name.exe 96 PID 4468 wrote to memory of 1804 4468 name.exe 99 PID 4468 wrote to memory of 1804 4468 name.exe 99 PID 4468 wrote to memory of 1804 4468 name.exe 99 PID 1804 wrote to memory of 1240 1804 name.exe 103 PID 1804 wrote to memory of 1240 1804 name.exe 103 PID 1804 wrote to memory of 1240 1804 name.exe 103 PID 1240 wrote to memory of 3224 1240 name.exe 104 PID 1240 wrote to memory of 3224 1240 name.exe 104 PID 1240 wrote to memory of 3224 1240 name.exe 104 PID 3224 wrote to memory of 2552 3224 name.exe 105 PID 3224 wrote to memory of 2552 3224 name.exe 105 PID 3224 wrote to memory of 2552 3224 name.exe 105 PID 2552 wrote to memory of 4044 2552 name.exe 108 PID 2552 wrote to memory of 4044 2552 name.exe 108 PID 2552 wrote to memory of 4044 2552 name.exe 108 PID 4044 wrote to memory of 2944 4044 name.exe 109 PID 4044 wrote to memory of 2944 4044 name.exe 109 PID 4044 wrote to memory of 2944 4044 name.exe 109 PID 2944 wrote to memory of 2976 2944 name.exe 114 PID 2944 wrote to memory of 2976 2944 name.exe 114 PID 2944 wrote to memory of 2976 2944 name.exe 114 PID 2976 wrote to memory of 60 2976 name.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe"C:\Users\Admin\AppData\Local\Temp\41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"10⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"11⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"14⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"15⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"16⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"17⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"19⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"20⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"21⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"22⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"23⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:60 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"24⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:388 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3304 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:384 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"27⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2208 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"28⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1604 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"29⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3120 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4988 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"31⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4776 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"32⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3716 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4868 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"35⤵
- Executes dropped EXE
PID:1192 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"36⤵
- Executes dropped EXE
PID:4196 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3968 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"38⤵
- Executes dropped EXE
PID:1080 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1408 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4036 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3128 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"45⤵
- Executes dropped EXE
PID:1284 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"47⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4676 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5028 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4672 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"52⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"53⤵
- Executes dropped EXE
PID:4000 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"54⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"55⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"56⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4760 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"58⤵
- Executes dropped EXE
PID:1224 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"59⤵
- Executes dropped EXE
PID:2416 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"60⤵
- Executes dropped EXE
PID:3640 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3356 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"62⤵
- Executes dropped EXE
PID:4604 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"64⤵
- Executes dropped EXE
PID:740 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:408 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"66⤵
- System Location Discovery: System Language Discovery
PID:3192 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"67⤵
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"68⤵
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"69⤵
- System Location Discovery: System Language Discovery
PID:4120 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"70⤵PID:2808
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"71⤵
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"72⤵
- System Location Discovery: System Language Discovery
PID:1412 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"73⤵PID:3912
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"74⤵
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"75⤵PID:3272
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"76⤵
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"77⤵PID:1668
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"78⤵PID:32
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"79⤵
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"80⤵PID:1468
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"81⤵
- System Location Discovery: System Language Discovery
PID:64 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"82⤵PID:3492
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"83⤵
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"84⤵PID:4456
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"85⤵
- System Location Discovery: System Language Discovery
PID:1396 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"86⤵
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"87⤵PID:4880
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"88⤵
- System Location Discovery: System Language Discovery
PID:4316 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"89⤵
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"90⤵
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"91⤵PID:4592
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"92⤵PID:1688
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"93⤵PID:1976
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"94⤵
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"95⤵
- System Location Discovery: System Language Discovery
PID:3628 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"96⤵PID:1736
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"97⤵PID:1372
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"98⤵PID:1432
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"99⤵PID:4904
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"100⤵PID:5104
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"101⤵PID:4772
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"102⤵PID:1012
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"103⤵
- System Location Discovery: System Language Discovery
PID:1152 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"104⤵
- System Location Discovery: System Language Discovery
PID:4080 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"105⤵PID:3932
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"106⤵PID:3348
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"107⤵PID:2620
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"108⤵
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"109⤵
- System Location Discovery: System Language Discovery
PID:868 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"110⤵PID:2684
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"111⤵PID:1600
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"112⤵
- System Location Discovery: System Language Discovery
PID:4244 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"113⤵PID:2160
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"114⤵
- System Location Discovery: System Language Discovery
PID:1424 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"115⤵PID:4580
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"116⤵PID:1348
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"117⤵
- System Location Discovery: System Language Discovery
PID:744 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"118⤵
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"119⤵PID:3380
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"120⤵
- System Location Discovery: System Language Discovery
PID:4664 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"121⤵PID:2672
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"122⤵
- System Location Discovery: System Language Discovery
PID:1072
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-