Overview
overview
10Static
static
100a36d74a14...04.exe
windows10-2004-x64
80b8b9525ea...96.exe
windows10-2004-x64
10bcbf39901...03.exe
windows10-2004-x64
100e5e999136...e7.exe
windows10-2004-x64
100fc0de254b...ce.exe
windows10-2004-x64
101a47c4fd5a...a8.exe
windows10-2004-x64
71a6ed538d9...ed.exe
windows10-2004-x64
71ac9b17068...d7.exe
windows10-2004-x64
81be6fdb2df...e9.exe
windows10-2004-x64
102bbbb9b0cd...b2.exe
windows10-2004-x64
102cda90e9e8...33.exe
windows10-2004-x64
32d58b1a373...aa.exe
windows10-2004-x64
52e966d3480...2e.exe
windows10-2004-x64
73a0297561d...1c.exe
windows10-2004-x64
103a90ad3258...8d.exe
windows10-2004-x64
63e76598b80...50.exe
windows10-2004-x64
104a5b5eb5a4...36.exe
windows10-2004-x64
104b482e8492...8c.exe
windows10-2004-x64
64bd46a2850...9c.exe
windows10-2004-x64
104cca8b360d...0a.exe
windows10-2004-x64
104e31114ffd...f7.exe
windows10-2004-x64
105ac2fcc4da...83.exe
windows10-2004-x64
105b25182d96...14.exe
windows10-2004-x64
75ddb366ead...46.exe
windows10-2004-x64
95f1364d246...bc.exe
windows10-2004-x64
106e0c9935ea...65.exe
windows10-2004-x64
16ea27426ff...08.exe
windows10-2004-x64
47dad12bd22...d2.exe
windows10-2004-x64
87db9e09e8b...71.exe
windows10-2004-x64
37e9af10bfe...5a.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2025, 08:20
Behavioral task
behavioral1
Sample
0a36d74a1458e8ca334d0c8169ec320e9d7735853a4c0c74660b578a13ee3104.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
0b8b9525ead4b3ebf6e5ba923057432a809d70b8beecb07df329ad23bf5a0c96.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
0bcbf399011c69a1690f596d2b607eb835ea55e7fc9b4e8a160cd49e0713af03.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
0e5e9991361cc4228bbb1f7c531379f52c2dd8e353af3f27b0d87a2c0d75b4e7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
0fc0de254bc80e54c708fbd0eb0460c730283508b94108e4b2d1d70525ef3fce.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral6
Sample
1a47c4fd5aa52c954123b3871ed1e6cdacf81b1d18e8281d1b0ab304133ee3a8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
1a6ed538d9ee30c5d1988968896c7028f99b24f43e5abbae96cc63281bcd8bed.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral8
Sample
1ac9b17068a19f093e347bafa92112dc8f1a935ba176aadbf58e57f35e4beed7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
1be6fdb2df40e128e25bd4959ae3fa83c634ced9f51ab2994c209dcadc9adde9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral10
Sample
2bbbb9b0cdbb3a1f26ce3357d9119edf008e4894c881351f89989a67d0a192b2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
2cda90e9e87c9db37ba5015909a7efb45fbe3a351ec9ca7a5359204e801dcb33.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral12
Sample
2d58b1a3735269002d5499c67bd32c3b800fd1c44ca78d19ac3d21df84832faa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
2e966d34801be95eae9a7f1dd5efe3885c234c473d377185f3b7af4dbbb99d2e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
3a0297561d1cab1471cd84e4c5308f19a9a33606784938235c7ff2eaa85d001c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
3a90ad325806107cadbd87ed4825ff967c3535e74433ab04fa6ff30b512b818d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral16
Sample
3e76598b8086857c38e2016dc729fa4879136e46b6f5962ff0b042ef35666b50.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral17
Sample
4a5b5eb5a4e1ba423df24c110fc43f7b3428d2126e99fd9c170b9dfb2baf7236.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral18
Sample
4b482e8492e8c1943330745899214b29bfd2582000371243400d854838dfb88c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
4bd46a2850788e5697d214dd4409c063b6f9c38c886443211f22fb0ff19bff9c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral20
Sample
4cca8b360d5053a789ea822ab80261dc6f010c1c72b0d449ca8cdcaffd2e2c0a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral22
Sample
5ac2fcc4daab08132ad947ffedcf88286f2af526a260111f3ae00de9ba0a6283.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
5b25182d96ac6fca82ecb8f99198295f45bf8fceea3fb196beb2a4e7bc862714.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
5ddb366eada77b037e23b02034be67099372dad8ab32668381290af66ec4ba46.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
5f1364d24646f22acc7127263adfb401a9c3a4655f9ecb085f931ebc9aaf61bc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral26
Sample
6e0c9935ea61a09f4ced2b9a871b5f21b637a7979b21aa4ccb490a9442182865.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral27
Sample
6ea27426ff47b4abd8a8e53f7d3452c981aa6fe86ca07ef15e45f6f8fcae3108.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral28
Sample
7dad12bd22c31f2618cc56cbd738f1cce5afaea128fcfe1deb18f4ac7366c9d2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
7db9e09e8bdcc45eafbb75b83d57503d11bf54d96c9eaa003fe8e5d518180571.exe
Resource
win10v2004-20250314-en
General
-
Target
4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe
-
Size
1.3MB
-
MD5
3b921ff1f40f6c6182e84a476152aaf3
-
SHA1
19db03733444cca5868939074c002de3d4b10948
-
SHA256
4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7
-
SHA512
2546f5d93d5e9a87416d880cad06a95275a9c441aef6481f5fd74cba8ecfe45d29c4486f2593f9567d5aa3e3d88eeaaf89b15f26da31f91cf869cfdb303c7ccc
-
SSDEEP
24576:V5ZWs+OZVEWry8AFaxtFyar0HteJyUt/1T7fQlbNW6AVDnSwRC4envs:jZB1G8YYFyaQW/1v4QnSwRC4Uvs
Malware Config
Extracted
remcos
���s�÷d
190.6.65.2:25158
microsoft.bnctechnology.space:36546
microsoft.bnctechnology.space:541
-
audio_folder
?§J?°Û¤ù
-
audio_record_time
5
-
connect_delay
60
-
connect_interval
60
-
copy_file
Virtual.exe
-
copy_folder
Oracle
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%Temp%
-
keylog_crypt
true
-
keylog_file
Microsofts.dat
-
keylog_flag
false
-
keylog_folder
Microsoft
-
mouse_option
false
-
mutex
juyrkrgj-UGC846
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
ºI?
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\juyrkrgj-UGC846 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Oracle\\Virtual.exe\"" Lin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Virtual.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\juyrkrgj-UGC846 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Oracle\\Virtual.exe\"" Virtual.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Lin.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation 4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation Lin.exe -
Executes dropped EXE 64 IoCs
pid Process 5564 login.exe 1352 Lin.exe 4316 Virtual.exe 388 Virtual.exe 4904 Virtual.exe 6016 Virtual.exe 2968 Virtual.exe 3372 Virtual.exe 644 Virtual.exe 1504 Virtual.exe 2540 Virtual.exe 1924 Virtual.exe 4956 Virtual.exe 1648 Virtual.exe 5516 Virtual.exe 4020 Virtual.exe 4196 Virtual.exe 764 Virtual.exe 3512 Virtual.exe 5136 Virtual.exe 4736 Virtual.exe 4660 Virtual.exe 4184 Virtual.exe 4884 Virtual.exe 1128 Virtual.exe 1904 Virtual.exe 664 Virtual.exe 1516 Virtual.exe 3468 Virtual.exe 1720 Virtual.exe 2832 Virtual.exe 5832 Virtual.exe 5064 Virtual.exe 6012 Virtual.exe 5152 Virtual.exe 2060 Virtual.exe 216 Virtual.exe 1660 Virtual.exe 4056 Virtual.exe 4752 Virtual.exe 4404 Virtual.exe 5040 Virtual.exe 4888 Virtual.exe 3864 Virtual.exe 4644 Virtual.exe 4544 Virtual.exe 2872 Virtual.exe 1516 Virtual.exe 1504 Virtual.exe 2188 Virtual.exe 1208 Virtual.exe 2068 Virtual.exe 1756 Virtual.exe 4228 Virtual.exe 4304 Virtual.exe 3500 Virtual.exe 3972 Virtual.exe 5196 Virtual.exe 4424 Virtual.exe 372 Virtual.exe 3512 Virtual.exe 744 Virtual.exe 2956 Virtual.exe 2308 Virtual.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juyrkrgj-UGC846 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Oracle\\Virtual.exe\"" Lin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\juyrkrgj-UGC846 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Oracle\\Virtual.exe\"" Lin.exe Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juyrkrgj-UGC846 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Oracle\\Virtual.exe\"" Virtual.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\juyrkrgj-UGC846 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Oracle\\Virtual.exe\"" Virtual.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4316 set thread context of 4760 4316 Virtual.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Virtual.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language login.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Virtual.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Lin.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4316 Virtual.exe 4316 Virtual.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5564 login.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5564 login.exe 5564 login.exe 5564 login.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 6020 wrote to memory of 5564 6020 4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe 88 PID 6020 wrote to memory of 5564 6020 4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe 88 PID 6020 wrote to memory of 5564 6020 4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe 88 PID 6020 wrote to memory of 1352 6020 4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe 91 PID 6020 wrote to memory of 1352 6020 4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe 91 PID 6020 wrote to memory of 1352 6020 4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe 91 PID 4440 wrote to memory of 4316 4440 cmd.exe 96 PID 4440 wrote to memory of 4316 4440 cmd.exe 96 PID 4440 wrote to memory of 4316 4440 cmd.exe 96 PID 4452 wrote to memory of 388 4452 cmd.exe 97 PID 4452 wrote to memory of 388 4452 cmd.exe 97 PID 4452 wrote to memory of 388 4452 cmd.exe 97 PID 4316 wrote to memory of 4784 4316 Virtual.exe 100 PID 4316 wrote to memory of 4784 4316 Virtual.exe 100 PID 4316 wrote to memory of 4784 4316 Virtual.exe 100 PID 4316 wrote to memory of 4760 4316 Virtual.exe 101 PID 4316 wrote to memory of 4760 4316 Virtual.exe 101 PID 4316 wrote to memory of 4760 4316 Virtual.exe 101 PID 4316 wrote to memory of 4760 4316 Virtual.exe 101 PID 4884 wrote to memory of 4904 4884 cmd.exe 104 PID 4884 wrote to memory of 4904 4884 cmd.exe 104 PID 4884 wrote to memory of 4904 4884 cmd.exe 104 PID 4756 wrote to memory of 6016 4756 cmd.exe 105 PID 4756 wrote to memory of 6016 4756 cmd.exe 105 PID 4756 wrote to memory of 6016 4756 cmd.exe 105 PID 1352 wrote to memory of 2968 1352 Lin.exe 106 PID 1352 wrote to memory of 2968 1352 Lin.exe 106 PID 1352 wrote to memory of 2968 1352 Lin.exe 106 PID 5856 wrote to memory of 3372 5856 cmd.exe 114 PID 5856 wrote to memory of 3372 5856 cmd.exe 114 PID 5856 wrote to memory of 3372 5856 cmd.exe 114 PID 3480 wrote to memory of 644 3480 cmd.exe 115 PID 3480 wrote to memory of 644 3480 cmd.exe 115 PID 3480 wrote to memory of 644 3480 cmd.exe 115 PID 1000 wrote to memory of 1504 1000 cmd.exe 122 PID 1000 wrote to memory of 1504 1000 cmd.exe 122 PID 1000 wrote to memory of 1504 1000 cmd.exe 122 PID 3580 wrote to memory of 2540 3580 cmd.exe 123 PID 3580 wrote to memory of 2540 3580 cmd.exe 123 PID 3580 wrote to memory of 2540 3580 cmd.exe 123 PID 2024 wrote to memory of 4956 2024 cmd.exe 129 PID 2024 wrote to memory of 4956 2024 cmd.exe 129 PID 2024 wrote to memory of 4956 2024 cmd.exe 129 PID 4240 wrote to memory of 1924 4240 cmd.exe 130 PID 4240 wrote to memory of 1924 4240 cmd.exe 130 PID 4240 wrote to memory of 1924 4240 cmd.exe 130 PID 2256 wrote to memory of 1648 2256 cmd.exe 137 PID 2256 wrote to memory of 1648 2256 cmd.exe 137 PID 2256 wrote to memory of 1648 2256 cmd.exe 137 PID 2396 wrote to memory of 5516 2396 cmd.exe 138 PID 2396 wrote to memory of 5516 2396 cmd.exe 138 PID 2396 wrote to memory of 5516 2396 cmd.exe 138 PID 2060 wrote to memory of 4020 2060 cmd.exe 143 PID 2060 wrote to memory of 4020 2060 cmd.exe 143 PID 2060 wrote to memory of 4020 2060 cmd.exe 143 PID 4720 wrote to memory of 4196 4720 cmd.exe 144 PID 4720 wrote to memory of 4196 4720 cmd.exe 144 PID 4720 wrote to memory of 4196 4720 cmd.exe 144 PID 5748 wrote to memory of 764 5748 cmd.exe 149 PID 5748 wrote to memory of 764 5748 cmd.exe 149 PID 5748 wrote to memory of 764 5748 cmd.exe 149 PID 2928 wrote to memory of 3512 2928 cmd.exe 150 PID 2928 wrote to memory of 3512 2928 cmd.exe 150 PID 2928 wrote to memory of 3512 2928 cmd.exe 150
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe"C:\Users\Admin\AppData\Local\Temp\4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:6020 -
C:\Users\Admin\AppData\Local\Temp\login.exe"C:\Users\Admin\AppData\Local\Temp\login.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5564
-
-
C:\Users\Admin\AppData\Local\Temp\Lin.exe"C:\Users\Admin\AppData\Local\Temp\Lin.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"3⤵
- Executes dropped EXE
PID:2968
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4784
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:6016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5856 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5748 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4184
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5152
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:6012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5540
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5372
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5556
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4424
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5848
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:6072
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:2252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:2856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5428
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5636
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:5740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5420
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:5688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:2016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5508
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:2024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5424
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:5792
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:5112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5160
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5356
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:5744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5196
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:2924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:2132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:5748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5968
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4804
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5772
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:5984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:2968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3452
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
464KB
MD587ba961523f14b4cd25dfc6a96c1fa8c
SHA188b195f9d4934b170c9ccaa912b3efb362e7cb18
SHA2562b3b023ebdc553863c84edb66c969da68fb5e505a203224ac72855d7359aae30
SHA512be7e65d25525dcea8a871db7a2bc08a45723cd69bf6b292ceb5f751079d64a0e3b19f657f6963f0e8d80ae9a13e981693130699f43b045c4d2da15a86dfa3b17
-
Filesize
968KB
MD52921d9fd9cb1b5fd59534d0a6423bb07
SHA180c39f75e6385d49162302e8bd78d91acefda14f
SHA2562494294241bafe261e88d3ac7345ebe4fc985968ef3294b41f0cfc5855b89df3
SHA5125e49de0ad5315c3489e5c8c8523b378d00be8f74c94ff9e7d73392a480fa4deaa2c75b65749506b1640e555afc666405e5da07f27e94cde3fe64ff230c2d673c