Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 14:32
Behavioral task
behavioral1
Sample
4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe
Resource
win10v2004-20241007-en
General
-
Target
4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe
-
Size
830KB
-
MD5
ac26baf5b7b03aa4046b2c2413a4c2c2
-
SHA1
4cc0593d71b377a7b5ffc9fa578dcb8dd374f4ea
-
SHA256
4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2
-
SHA512
df6a508cf59c7b08dbf8c238e9e41c4d5940336176bb0e5e0a0f11a3fab213831c532c86e96ec401ec94692010a6663bacb54f2e9fbd212b99defc9e97625798
-
SSDEEP
24576:Prl6kD68JmlotQfL4boOtmYOaarnTDRTf:zl328U2yfkmmarnTDR
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lecheries.vbs lecheries.exe -
Executes dropped EXE 64 IoCs
pid Process 2528 lecheries.exe 2744 lecheries.exe 2624 lecheries.exe 3028 lecheries.exe 2788 lecheries.exe 2680 lecheries.exe 2272 lecheries.exe 1788 lecheries.exe 1928 lecheries.exe 1860 lecheries.exe 1156 lecheries.exe 1196 lecheries.exe 1980 lecheries.exe 1960 lecheries.exe 2928 lecheries.exe 2796 lecheries.exe 2976 lecheries.exe 2328 lecheries.exe 2012 lecheries.exe 2508 lecheries.exe 1676 lecheries.exe 2476 lecheries.exe 3068 lecheries.exe 1692 lecheries.exe 2236 lecheries.exe 2484 lecheries.exe 1584 lecheries.exe 2552 lecheries.exe 2196 lecheries.exe 2960 lecheries.exe 2936 lecheries.exe 2644 lecheries.exe 2736 lecheries.exe 584 lecheries.exe 1680 lecheries.exe 352 lecheries.exe 1968 lecheries.exe 1420 lecheries.exe 1924 lecheries.exe 1268 lecheries.exe 316 lecheries.exe 1348 lecheries.exe 2912 lecheries.exe 684 lecheries.exe 600 lecheries.exe 672 lecheries.exe 2020 lecheries.exe 908 lecheries.exe 772 lecheries.exe 2100 lecheries.exe 568 lecheries.exe 2180 lecheries.exe 1724 lecheries.exe 2344 lecheries.exe 2200 lecheries.exe 2056 lecheries.exe 2540 lecheries.exe 2376 lecheries.exe 2756 lecheries.exe 2888 lecheries.exe 2884 lecheries.exe 2612 lecheries.exe 2156 lecheries.exe 1576 lecheries.exe -
Loads dropped DLL 2 IoCs
pid Process 2068 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 2528 lecheries.exe -
AutoIT Executable 64 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2068-13-0x00000000011F0000-0x00000000013BC000-memory.dmp autoit_exe behavioral1/memory/2528-31-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2744-32-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2744-40-0x0000000000AC0000-0x0000000000EC0000-memory.dmp autoit_exe behavioral1/memory/2744-43-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2624-54-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/3028-55-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/3028-65-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2788-76-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2680-77-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2680-88-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2272-98-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1788-108-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1928-119-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1860-120-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1860-130-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1156-141-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1196-142-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1196-152-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1980-163-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1960-174-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2928-184-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2796-185-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2796-195-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2976-206-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2328-207-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2328-217-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2012-218-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2012-228-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2508-229-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2508-239-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1676-249-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2476-260-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/3068-271-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1692-272-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1692-282-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2236-293-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2484-304-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1584-305-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1584-315-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2552-326-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2196-336-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2960-337-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2960-347-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2936-356-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2644-357-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2644-365-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2736-373-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/584-381-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1680-389-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/352-398-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1968-406-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1420-413-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1924-422-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1268-423-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1268-431-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/316-440-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1348-441-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/1348-449-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/2912-457-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/684-458-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/684-466-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/600-474-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe behavioral1/memory/672-483-0x0000000000880000-0x0000000000A4C000-memory.dmp autoit_exe -
resource yara_rule behavioral1/memory/2068-0-0x00000000011F0000-0x00000000013BC000-memory.dmp upx behavioral1/files/0x000700000001903b-9.dat upx behavioral1/memory/2528-16-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2068-13-0x00000000011F0000-0x00000000013BC000-memory.dmp upx behavioral1/memory/2528-31-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2528-29-0x0000000002A10000-0x0000000002BDC000-memory.dmp upx behavioral1/memory/2744-32-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2744-43-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2624-44-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2624-54-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/3028-55-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/3028-65-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2788-66-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2788-76-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2680-77-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2680-88-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1788-99-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2272-98-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1928-109-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1788-108-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1928-119-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1860-120-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1860-130-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1156-131-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1156-141-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1196-142-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1980-153-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1196-152-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1960-164-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1980-163-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1960-174-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2928-184-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2796-185-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2976-196-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2796-195-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2976-206-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2328-207-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2328-217-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2012-218-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2012-228-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2508-229-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2508-239-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2476-250-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1676-249-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2476-260-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/3068-261-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/3068-271-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1692-272-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1692-282-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2236-283-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2484-294-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2236-293-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2484-304-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1584-305-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2552-316-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/1584-315-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2552-326-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2196-336-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2960-337-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2960-347-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2936-348-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2936-356-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2644-357-0x0000000000880000-0x0000000000A4C000-memory.dmp upx behavioral1/memory/2644-365-0x0000000000880000-0x0000000000A4C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2068 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 2068 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 2528 lecheries.exe 2528 lecheries.exe 2744 lecheries.exe 2744 lecheries.exe 2624 lecheries.exe 2624 lecheries.exe 3028 lecheries.exe 3028 lecheries.exe 2788 lecheries.exe 2788 lecheries.exe 2680 lecheries.exe 2680 lecheries.exe 2272 lecheries.exe 2272 lecheries.exe 1788 lecheries.exe 1788 lecheries.exe 1928 lecheries.exe 1928 lecheries.exe 1860 lecheries.exe 1860 lecheries.exe 1156 lecheries.exe 1156 lecheries.exe 1196 lecheries.exe 1196 lecheries.exe 1980 lecheries.exe 1980 lecheries.exe 1960 lecheries.exe 1960 lecheries.exe 2928 lecheries.exe 2928 lecheries.exe 2796 lecheries.exe 2796 lecheries.exe 2976 lecheries.exe 2976 lecheries.exe 2328 lecheries.exe 2328 lecheries.exe 2012 lecheries.exe 2012 lecheries.exe 2508 lecheries.exe 2508 lecheries.exe 1676 lecheries.exe 1676 lecheries.exe 2476 lecheries.exe 2476 lecheries.exe 3068 lecheries.exe 3068 lecheries.exe 1692 lecheries.exe 1692 lecheries.exe 2236 lecheries.exe 2236 lecheries.exe 2484 lecheries.exe 2484 lecheries.exe 1584 lecheries.exe 1584 lecheries.exe 2552 lecheries.exe 2552 lecheries.exe 2196 lecheries.exe 2196 lecheries.exe 2960 lecheries.exe 2960 lecheries.exe 2936 lecheries.exe 2936 lecheries.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2068 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 2068 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 2528 lecheries.exe 2528 lecheries.exe 2744 lecheries.exe 2744 lecheries.exe 2624 lecheries.exe 2624 lecheries.exe 3028 lecheries.exe 3028 lecheries.exe 2788 lecheries.exe 2788 lecheries.exe 2680 lecheries.exe 2680 lecheries.exe 2272 lecheries.exe 2272 lecheries.exe 1788 lecheries.exe 1788 lecheries.exe 1928 lecheries.exe 1928 lecheries.exe 1860 lecheries.exe 1860 lecheries.exe 1156 lecheries.exe 1156 lecheries.exe 1196 lecheries.exe 1196 lecheries.exe 1980 lecheries.exe 1980 lecheries.exe 1960 lecheries.exe 1960 lecheries.exe 2928 lecheries.exe 2928 lecheries.exe 2796 lecheries.exe 2796 lecheries.exe 2976 lecheries.exe 2976 lecheries.exe 2328 lecheries.exe 2328 lecheries.exe 2012 lecheries.exe 2012 lecheries.exe 2508 lecheries.exe 2508 lecheries.exe 1676 lecheries.exe 1676 lecheries.exe 2476 lecheries.exe 2476 lecheries.exe 3068 lecheries.exe 3068 lecheries.exe 1692 lecheries.exe 1692 lecheries.exe 2236 lecheries.exe 2236 lecheries.exe 2484 lecheries.exe 2484 lecheries.exe 1584 lecheries.exe 1584 lecheries.exe 2552 lecheries.exe 2552 lecheries.exe 2196 lecheries.exe 2196 lecheries.exe 2960 lecheries.exe 2960 lecheries.exe 2936 lecheries.exe 2936 lecheries.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2528 2068 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 31 PID 2068 wrote to memory of 2528 2068 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 31 PID 2068 wrote to memory of 2528 2068 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 31 PID 2068 wrote to memory of 2528 2068 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 31 PID 2528 wrote to memory of 2744 2528 lecheries.exe 32 PID 2528 wrote to memory of 2744 2528 lecheries.exe 32 PID 2528 wrote to memory of 2744 2528 lecheries.exe 32 PID 2528 wrote to memory of 2744 2528 lecheries.exe 32 PID 2744 wrote to memory of 2624 2744 lecheries.exe 33 PID 2744 wrote to memory of 2624 2744 lecheries.exe 33 PID 2744 wrote to memory of 2624 2744 lecheries.exe 33 PID 2744 wrote to memory of 2624 2744 lecheries.exe 33 PID 2624 wrote to memory of 3028 2624 lecheries.exe 34 PID 2624 wrote to memory of 3028 2624 lecheries.exe 34 PID 2624 wrote to memory of 3028 2624 lecheries.exe 34 PID 2624 wrote to memory of 3028 2624 lecheries.exe 34 PID 3028 wrote to memory of 2788 3028 lecheries.exe 35 PID 3028 wrote to memory of 2788 3028 lecheries.exe 35 PID 3028 wrote to memory of 2788 3028 lecheries.exe 35 PID 3028 wrote to memory of 2788 3028 lecheries.exe 35 PID 2788 wrote to memory of 2680 2788 lecheries.exe 36 PID 2788 wrote to memory of 2680 2788 lecheries.exe 36 PID 2788 wrote to memory of 2680 2788 lecheries.exe 36 PID 2788 wrote to memory of 2680 2788 lecheries.exe 36 PID 2680 wrote to memory of 2272 2680 lecheries.exe 37 PID 2680 wrote to memory of 2272 2680 lecheries.exe 37 PID 2680 wrote to memory of 2272 2680 lecheries.exe 37 PID 2680 wrote to memory of 2272 2680 lecheries.exe 37 PID 2272 wrote to memory of 1788 2272 lecheries.exe 38 PID 2272 wrote to memory of 1788 2272 lecheries.exe 38 PID 2272 wrote to memory of 1788 2272 lecheries.exe 38 PID 2272 wrote to memory of 1788 2272 lecheries.exe 38 PID 1788 wrote to memory of 1928 1788 lecheries.exe 39 PID 1788 wrote to memory of 1928 1788 lecheries.exe 39 PID 1788 wrote to memory of 1928 1788 lecheries.exe 39 PID 1788 wrote to memory of 1928 1788 lecheries.exe 39 PID 1928 wrote to memory of 1860 1928 lecheries.exe 40 PID 1928 wrote to memory of 1860 1928 lecheries.exe 40 PID 1928 wrote to memory of 1860 1928 lecheries.exe 40 PID 1928 wrote to memory of 1860 1928 lecheries.exe 40 PID 1860 wrote to memory of 1156 1860 lecheries.exe 41 PID 1860 wrote to memory of 1156 1860 lecheries.exe 41 PID 1860 wrote to memory of 1156 1860 lecheries.exe 41 PID 1860 wrote to memory of 1156 1860 lecheries.exe 41 PID 1156 wrote to memory of 1196 1156 lecheries.exe 42 PID 1156 wrote to memory of 1196 1156 lecheries.exe 42 PID 1156 wrote to memory of 1196 1156 lecheries.exe 42 PID 1156 wrote to memory of 1196 1156 lecheries.exe 42 PID 1196 wrote to memory of 1980 1196 lecheries.exe 43 PID 1196 wrote to memory of 1980 1196 lecheries.exe 43 PID 1196 wrote to memory of 1980 1196 lecheries.exe 43 PID 1196 wrote to memory of 1980 1196 lecheries.exe 43 PID 1980 wrote to memory of 1960 1980 lecheries.exe 44 PID 1980 wrote to memory of 1960 1980 lecheries.exe 44 PID 1980 wrote to memory of 1960 1980 lecheries.exe 44 PID 1980 wrote to memory of 1960 1980 lecheries.exe 44 PID 1960 wrote to memory of 2928 1960 lecheries.exe 45 PID 1960 wrote to memory of 2928 1960 lecheries.exe 45 PID 1960 wrote to memory of 2928 1960 lecheries.exe 45 PID 1960 wrote to memory of 2928 1960 lecheries.exe 45 PID 2928 wrote to memory of 2796 2928 lecheries.exe 46 PID 2928 wrote to memory of 2796 2928 lecheries.exe 46 PID 2928 wrote to memory of 2796 2928 lecheries.exe 46 PID 2928 wrote to memory of 2796 2928 lecheries.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe"C:\Users\Admin\AppData\Local\Temp\4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\Temp\4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"6⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"7⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"11⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"12⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"13⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"14⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"15⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"16⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"17⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2796 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"18⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2976 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"19⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2328 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2012 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"21⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2508 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"22⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1676 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"23⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2476 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"24⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3068 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"25⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1692 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"26⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2236 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"27⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2484 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"28⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1584 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"29⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2552 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"30⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2196 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"31⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2960 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"32⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2936 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"33⤵
- Executes dropped EXE
PID:2644 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"34⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"35⤵
- Executes dropped EXE
PID:584 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"37⤵
- Executes dropped EXE
PID:352 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"38⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"39⤵
- Executes dropped EXE
PID:1420 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"40⤵
- Executes dropped EXE
PID:1924 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"41⤵
- Executes dropped EXE
PID:1268 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:316 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"43⤵
- Executes dropped EXE
PID:1348 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"44⤵
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"45⤵
- Executes dropped EXE
PID:684 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:600 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:672 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"48⤵
- Executes dropped EXE
PID:2020 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:908 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:772 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"51⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"52⤵
- Executes dropped EXE
PID:568 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"53⤵
- Executes dropped EXE
PID:2180 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"55⤵
- Executes dropped EXE
PID:2344 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"56⤵
- Executes dropped EXE
PID:2200 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"57⤵
- Executes dropped EXE
PID:2056 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"58⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"59⤵
- Executes dropped EXE
PID:2376 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2756 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"61⤵
- Executes dropped EXE
PID:2888 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"62⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"65⤵
- Executes dropped EXE
PID:1576 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"66⤵
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"67⤵PID:2516
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"68⤵PID:1224
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"69⤵
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"70⤵PID:1972
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"71⤵PID:2792
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"72⤵PID:2856
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"73⤵PID:988
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"74⤵
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"75⤵
- System Location Discovery: System Language Discovery
PID:980 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"76⤵PID:1864
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"77⤵PID:2848
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"78⤵PID:900
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"79⤵
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"80⤵PID:1076
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"81⤵PID:688
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"82⤵PID:2448
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"83⤵PID:2412
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"84⤵PID:3024
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"85⤵PID:1596
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"86⤵PID:2548
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"87⤵PID:2800
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"88⤵
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"89⤵PID:2880
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"90⤵PID:2616
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"91⤵PID:536
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"92⤵PID:2028
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"93⤵PID:1688
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"94⤵PID:2000
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"95⤵PID:2424
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"96⤵PID:1368
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"97⤵PID:3012
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"98⤵PID:852
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"99⤵PID:2684
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"100⤵
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"101⤵PID:2400
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"102⤵PID:1644
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"103⤵PID:2160
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"104⤵PID:1068
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"105⤵PID:552
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"106⤵PID:2092
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"107⤵PID:1728
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"108⤵
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"109⤵PID:2768
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"110⤵
- System Location Discovery: System Language Discovery
PID:604 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"111⤵PID:2628
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"112⤵PID:1332
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"113⤵
- System Location Discovery: System Language Discovery
PID:1844 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"114⤵PID:1748
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"115⤵PID:2988
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"116⤵
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"117⤵PID:1004
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"118⤵
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"119⤵
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"120⤵PID:1164
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"121⤵PID:2916
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"122⤵PID:1632
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-