Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 03:01
Behavioral task
behavioral1
Sample
4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe
Resource
win10v2004-20241007-en
General
-
Target
4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe
-
Size
830KB
-
MD5
ac26baf5b7b03aa4046b2c2413a4c2c2
-
SHA1
4cc0593d71b377a7b5ffc9fa578dcb8dd374f4ea
-
SHA256
4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2
-
SHA512
df6a508cf59c7b08dbf8c238e9e41c4d5940336176bb0e5e0a0f11a3fab213831c532c86e96ec401ec94692010a6663bacb54f2e9fbd212b99defc9e97625798
-
SSDEEP
24576:Prl6kD68JmlotQfL4boOtmYOaarnTDRTf:zl328U2yfkmmarnTDR
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lecheries.vbs lecheries.exe -
Executes dropped EXE 64 IoCs
pid Process 1984 lecheries.exe 1548 lecheries.exe 1848 lecheries.exe 2892 lecheries.exe 3068 lecheries.exe 2952 lecheries.exe 2480 lecheries.exe 2672 lecheries.exe 2140 lecheries.exe 2680 lecheries.exe 1832 lecheries.exe 1944 lecheries.exe 2288 lecheries.exe 1236 lecheries.exe 2820 lecheries.exe 2444 lecheries.exe 1884 lecheries.exe 912 lecheries.exe 1564 lecheries.exe 1104 lecheries.exe 2380 lecheries.exe 1700 lecheries.exe 1572 lecheries.exe 1468 lecheries.exe 980 lecheries.exe 1120 lecheries.exe 2072 lecheries.exe 1588 lecheries.exe 356 lecheries.exe 2552 lecheries.exe 2472 lecheries.exe 2732 lecheries.exe 536 lecheries.exe 2648 lecheries.exe 2676 lecheries.exe 2460 lecheries.exe 1512 lecheries.exe 2516 lecheries.exe 1232 lecheries.exe 2356 lecheries.exe 1776 lecheries.exe 1764 lecheries.exe 2040 lecheries.exe 2376 lecheries.exe 2060 lecheries.exe 3044 lecheries.exe 1100 lecheries.exe 1948 lecheries.exe 1496 lecheries.exe 1996 lecheries.exe 1756 lecheries.exe 1676 lecheries.exe 676 lecheries.exe 2184 lecheries.exe 2412 lecheries.exe 2028 lecheries.exe 2808 lecheries.exe 2252 lecheries.exe 1144 lecheries.exe 2468 lecheries.exe 2876 lecheries.exe 2916 lecheries.exe 2656 lecheries.exe 1704 lecheries.exe -
Loads dropped DLL 1 IoCs
pid Process 2320 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe -
AutoIT Executable 64 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2320-15-0x0000000000BD0000-0x0000000000D9C000-memory.dmp autoit_exe behavioral1/memory/1984-27-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1548-36-0x00000000008E0000-0x0000000000CE0000-memory.dmp autoit_exe behavioral1/memory/1548-39-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1848-49-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/3068-61-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2892-60-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/3068-71-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2952-72-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2480-84-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2952-82-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2672-95-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2480-94-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2672-105-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2140-115-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2680-116-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2680-126-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1944-138-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1832-137-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2288-149-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1944-148-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2288-159-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1236-160-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1236-170-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2820-180-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2444-191-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/912-202-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1884-201-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/912-212-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1104-223-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1564-222-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1104-233-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2380-243-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1700-254-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1572-265-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1468-266-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1468-276-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1120-287-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/980-286-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1120-296-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2072-302-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1588-303-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1588-313-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2552-324-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/356-323-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2552-334-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2472-344-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2732-352-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/536-360-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2648-361-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2648-369-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2460-378-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2676-377-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2460-386-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1512-394-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2516-403-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1232-411-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2356-419-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1776-427-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/1764-436-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2040-444-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2376-453-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/2060-461-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe behavioral1/memory/3044-470-0x00000000000E0000-0x00000000002AC000-memory.dmp autoit_exe -
resource yara_rule behavioral1/memory/2320-0-0x0000000000BD0000-0x0000000000D9C000-memory.dmp upx behavioral1/files/0x0008000000016b47-9.dat upx behavioral1/memory/1984-16-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2320-15-0x0000000000BD0000-0x0000000000D9C000-memory.dmp upx behavioral1/memory/2320-14-0x0000000002C20000-0x0000000002DEC000-memory.dmp upx behavioral1/memory/1984-27-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1548-39-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1848-49-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2892-50-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/3068-61-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2892-60-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/3068-71-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2952-72-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2480-84-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2952-82-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2672-95-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2480-94-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2672-105-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2140-115-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2680-116-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1832-127-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2680-126-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1944-138-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1832-137-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2288-149-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1944-148-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2288-159-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1236-160-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1236-170-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2820-180-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2444-181-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2444-191-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/912-202-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1884-201-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/912-212-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1104-223-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1564-222-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1104-233-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2380-243-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1700-244-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1572-255-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1700-254-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1572-265-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1468-266-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1468-276-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1120-287-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/980-286-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2072-297-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1120-296-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2072-302-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1588-303-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/1588-313-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2552-324-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/356-323-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2552-334-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2472-344-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2732-345-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2732-352-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/536-360-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2648-361-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2648-369-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2460-378-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2676-377-0x00000000000E0000-0x00000000002AC000-memory.dmp upx behavioral1/memory/2460-386-0x00000000000E0000-0x00000000002AC000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2320 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 2320 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 1984 lecheries.exe 1984 lecheries.exe 1548 lecheries.exe 1548 lecheries.exe 1848 lecheries.exe 1848 lecheries.exe 2892 lecheries.exe 2892 lecheries.exe 3068 lecheries.exe 3068 lecheries.exe 2952 lecheries.exe 2952 lecheries.exe 2480 lecheries.exe 2480 lecheries.exe 2672 lecheries.exe 2672 lecheries.exe 2140 lecheries.exe 2140 lecheries.exe 2680 lecheries.exe 2680 lecheries.exe 1832 lecheries.exe 1832 lecheries.exe 1944 lecheries.exe 1944 lecheries.exe 2288 lecheries.exe 2288 lecheries.exe 1236 lecheries.exe 1236 lecheries.exe 2820 lecheries.exe 2820 lecheries.exe 2444 lecheries.exe 2444 lecheries.exe 1884 lecheries.exe 1884 lecheries.exe 912 lecheries.exe 912 lecheries.exe 1564 lecheries.exe 1564 lecheries.exe 1104 lecheries.exe 1104 lecheries.exe 2380 lecheries.exe 2380 lecheries.exe 1700 lecheries.exe 1700 lecheries.exe 1572 lecheries.exe 1572 lecheries.exe 1468 lecheries.exe 1468 lecheries.exe 980 lecheries.exe 980 lecheries.exe 1120 lecheries.exe 1120 lecheries.exe 1588 lecheries.exe 1588 lecheries.exe 356 lecheries.exe 356 lecheries.exe 2552 lecheries.exe 2552 lecheries.exe 2472 lecheries.exe 2472 lecheries.exe 2732 lecheries.exe 2732 lecheries.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2320 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 2320 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 1984 lecheries.exe 1984 lecheries.exe 1548 lecheries.exe 1548 lecheries.exe 1848 lecheries.exe 1848 lecheries.exe 2892 lecheries.exe 2892 lecheries.exe 3068 lecheries.exe 3068 lecheries.exe 2952 lecheries.exe 2952 lecheries.exe 2480 lecheries.exe 2480 lecheries.exe 2672 lecheries.exe 2672 lecheries.exe 2140 lecheries.exe 2140 lecheries.exe 2680 lecheries.exe 2680 lecheries.exe 1832 lecheries.exe 1832 lecheries.exe 1944 lecheries.exe 1944 lecheries.exe 2288 lecheries.exe 2288 lecheries.exe 1236 lecheries.exe 1236 lecheries.exe 2820 lecheries.exe 2820 lecheries.exe 2444 lecheries.exe 2444 lecheries.exe 1884 lecheries.exe 1884 lecheries.exe 912 lecheries.exe 912 lecheries.exe 1564 lecheries.exe 1564 lecheries.exe 1104 lecheries.exe 1104 lecheries.exe 2380 lecheries.exe 2380 lecheries.exe 1700 lecheries.exe 1700 lecheries.exe 1572 lecheries.exe 1572 lecheries.exe 1468 lecheries.exe 1468 lecheries.exe 980 lecheries.exe 980 lecheries.exe 1120 lecheries.exe 1120 lecheries.exe 1588 lecheries.exe 1588 lecheries.exe 356 lecheries.exe 356 lecheries.exe 2552 lecheries.exe 2552 lecheries.exe 2472 lecheries.exe 2472 lecheries.exe 2732 lecheries.exe 2732 lecheries.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1984 2320 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 30 PID 2320 wrote to memory of 1984 2320 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 30 PID 2320 wrote to memory of 1984 2320 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 30 PID 2320 wrote to memory of 1984 2320 4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe 30 PID 1984 wrote to memory of 1548 1984 lecheries.exe 31 PID 1984 wrote to memory of 1548 1984 lecheries.exe 31 PID 1984 wrote to memory of 1548 1984 lecheries.exe 31 PID 1984 wrote to memory of 1548 1984 lecheries.exe 31 PID 1548 wrote to memory of 1848 1548 lecheries.exe 33 PID 1548 wrote to memory of 1848 1548 lecheries.exe 33 PID 1548 wrote to memory of 1848 1548 lecheries.exe 33 PID 1548 wrote to memory of 1848 1548 lecheries.exe 33 PID 1848 wrote to memory of 2892 1848 lecheries.exe 34 PID 1848 wrote to memory of 2892 1848 lecheries.exe 34 PID 1848 wrote to memory of 2892 1848 lecheries.exe 34 PID 1848 wrote to memory of 2892 1848 lecheries.exe 34 PID 2892 wrote to memory of 3068 2892 lecheries.exe 35 PID 2892 wrote to memory of 3068 2892 lecheries.exe 35 PID 2892 wrote to memory of 3068 2892 lecheries.exe 35 PID 2892 wrote to memory of 3068 2892 lecheries.exe 35 PID 3068 wrote to memory of 2952 3068 lecheries.exe 36 PID 3068 wrote to memory of 2952 3068 lecheries.exe 36 PID 3068 wrote to memory of 2952 3068 lecheries.exe 36 PID 3068 wrote to memory of 2952 3068 lecheries.exe 36 PID 2952 wrote to memory of 2480 2952 lecheries.exe 37 PID 2952 wrote to memory of 2480 2952 lecheries.exe 37 PID 2952 wrote to memory of 2480 2952 lecheries.exe 37 PID 2952 wrote to memory of 2480 2952 lecheries.exe 37 PID 2480 wrote to memory of 2672 2480 lecheries.exe 38 PID 2480 wrote to memory of 2672 2480 lecheries.exe 38 PID 2480 wrote to memory of 2672 2480 lecheries.exe 38 PID 2480 wrote to memory of 2672 2480 lecheries.exe 38 PID 2672 wrote to memory of 2140 2672 lecheries.exe 39 PID 2672 wrote to memory of 2140 2672 lecheries.exe 39 PID 2672 wrote to memory of 2140 2672 lecheries.exe 39 PID 2672 wrote to memory of 2140 2672 lecheries.exe 39 PID 2140 wrote to memory of 2680 2140 lecheries.exe 40 PID 2140 wrote to memory of 2680 2140 lecheries.exe 40 PID 2140 wrote to memory of 2680 2140 lecheries.exe 40 PID 2140 wrote to memory of 2680 2140 lecheries.exe 40 PID 2680 wrote to memory of 1832 2680 lecheries.exe 41 PID 2680 wrote to memory of 1832 2680 lecheries.exe 41 PID 2680 wrote to memory of 1832 2680 lecheries.exe 41 PID 2680 wrote to memory of 1832 2680 lecheries.exe 41 PID 1832 wrote to memory of 1944 1832 lecheries.exe 42 PID 1832 wrote to memory of 1944 1832 lecheries.exe 42 PID 1832 wrote to memory of 1944 1832 lecheries.exe 42 PID 1832 wrote to memory of 1944 1832 lecheries.exe 42 PID 1944 wrote to memory of 2288 1944 lecheries.exe 43 PID 1944 wrote to memory of 2288 1944 lecheries.exe 43 PID 1944 wrote to memory of 2288 1944 lecheries.exe 43 PID 1944 wrote to memory of 2288 1944 lecheries.exe 43 PID 2288 wrote to memory of 1236 2288 lecheries.exe 44 PID 2288 wrote to memory of 1236 2288 lecheries.exe 44 PID 2288 wrote to memory of 1236 2288 lecheries.exe 44 PID 2288 wrote to memory of 1236 2288 lecheries.exe 44 PID 1236 wrote to memory of 2820 1236 lecheries.exe 45 PID 1236 wrote to memory of 2820 1236 lecheries.exe 45 PID 1236 wrote to memory of 2820 1236 lecheries.exe 45 PID 1236 wrote to memory of 2820 1236 lecheries.exe 45 PID 2820 wrote to memory of 2444 2820 lecheries.exe 46 PID 2820 wrote to memory of 2444 2820 lecheries.exe 46 PID 2820 wrote to memory of 2444 2820 lecheries.exe 46 PID 2820 wrote to memory of 2444 2820 lecheries.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe"C:\Users\Admin\AppData\Local\Temp\4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\Temp\4108277feb47e70ea76dea706b8a8e7ed1dc94575c1ed200e78073b4d97185a2.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"7⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"10⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"11⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"13⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"14⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"15⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"17⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2444 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"18⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1884 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"19⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:912 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1564 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"21⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1104 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"22⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2380 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"23⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1700 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"24⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1572 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"25⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1468 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:980 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"27⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1120 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"29⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1588 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:356 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"31⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2552 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"32⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2472 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2732 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"34⤵
- Executes dropped EXE
PID:536 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"35⤵
- Executes dropped EXE
PID:2648 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"36⤵
- Executes dropped EXE
PID:2676 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"39⤵
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"40⤵
- Executes dropped EXE
PID:1232 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"41⤵
- Executes dropped EXE
PID:2356 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"42⤵
- Executes dropped EXE
PID:1776 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"43⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"44⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"45⤵
- Executes dropped EXE
PID:2376 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"46⤵
- Executes dropped EXE
PID:2060 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"47⤵
- Executes dropped EXE
PID:3044 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"48⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"49⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"50⤵
- Executes dropped EXE
PID:1496 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"51⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"52⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1676 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"54⤵
- Executes dropped EXE
PID:676 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"57⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"58⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"59⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"60⤵
- Executes dropped EXE
PID:1144 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"61⤵
- Executes dropped EXE
PID:2468 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"62⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"64⤵
- Executes dropped EXE
PID:2656 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"65⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"66⤵PID:2416
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"67⤵PID:2428
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"68⤵PID:2296
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"69⤵PID:1632
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"70⤵PID:1780
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"71⤵PID:1424
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"72⤵PID:2836
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"73⤵PID:548
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"74⤵PID:3052
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"75⤵PID:1608
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"76⤵PID:2148
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"77⤵
- System Location Discovery: System Language Discovery
PID:1352 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"78⤵PID:1720
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"79⤵PID:2196
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"80⤵PID:556
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"81⤵PID:1936
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"82⤵PID:2208
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"83⤵PID:2220
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"84⤵
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"85⤵PID:1592
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"86⤵PID:2332
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"87⤵
- System Location Discovery: System Language Discovery
PID:296 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"88⤵PID:2708
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"89⤵PID:2752
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"90⤵
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"91⤵PID:2736
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"92⤵PID:2616
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"93⤵PID:2512
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"94⤵
- System Location Discovery: System Language Discovery
PID:1292 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"95⤵
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"96⤵PID:1760
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"97⤵PID:2800
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"98⤵
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"99⤵
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"100⤵PID:2988
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"101⤵
- System Location Discovery: System Language Discovery
PID:928 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"102⤵PID:1616
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"103⤵PID:1332
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"104⤵PID:2508
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"105⤵
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"106⤵PID:2084
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"107⤵PID:580
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"108⤵PID:2080
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"109⤵
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"110⤵
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"111⤵
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"112⤵PID:3064
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"113⤵PID:860
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"114⤵PID:2864
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"115⤵
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"116⤵PID:2720
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"117⤵PID:3012
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"118⤵
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"119⤵PID:3040
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"120⤵PID:1724
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"121⤵PID:2228
-
C:\Users\Admin\AppData\Local\differences\lecheries.exe"C:\Users\Admin\AppData\Local\differences\lecheries.exe"122⤵PID:320
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-