Overview
overview
10Static
static
100a36d74a14...04.exe
windows10-2004-x64
80b8b9525ea...96.exe
windows10-2004-x64
10bcbf39901...03.exe
windows10-2004-x64
100e5e999136...e7.exe
windows10-2004-x64
100fc0de254b...ce.exe
windows10-2004-x64
101a47c4fd5a...a8.exe
windows10-2004-x64
71a6ed538d9...ed.exe
windows10-2004-x64
71ac9b17068...d7.exe
windows10-2004-x64
81be6fdb2df...e9.exe
windows10-2004-x64
102bbbb9b0cd...b2.exe
windows10-2004-x64
102cda90e9e8...33.exe
windows10-2004-x64
32d58b1a373...aa.exe
windows10-2004-x64
52e966d3480...2e.exe
windows10-2004-x64
73a0297561d...1c.exe
windows10-2004-x64
103a90ad3258...8d.exe
windows10-2004-x64
63e76598b80...50.exe
windows10-2004-x64
104a5b5eb5a4...36.exe
windows10-2004-x64
104b482e8492...8c.exe
windows10-2004-x64
64bd46a2850...9c.exe
windows10-2004-x64
104cca8b360d...0a.exe
windows10-2004-x64
104e31114ffd...f7.exe
windows10-2004-x64
105ac2fcc4da...83.exe
windows10-2004-x64
105b25182d96...14.exe
windows10-2004-x64
75ddb366ead...46.exe
windows10-2004-x64
95f1364d246...bc.exe
windows10-2004-x64
106e0c9935ea...65.exe
windows10-2004-x64
16ea27426ff...08.exe
windows10-2004-x64
47dad12bd22...d2.exe
windows10-2004-x64
87db9e09e8b...71.exe
windows10-2004-x64
37e9af10bfe...5a.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2025, 08:25
Behavioral task
behavioral1
Sample
0a36d74a1458e8ca334d0c8169ec320e9d7735853a4c0c74660b578a13ee3104.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
0b8b9525ead4b3ebf6e5ba923057432a809d70b8beecb07df329ad23bf5a0c96.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
0bcbf399011c69a1690f596d2b607eb835ea55e7fc9b4e8a160cd49e0713af03.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
0e5e9991361cc4228bbb1f7c531379f52c2dd8e353af3f27b0d87a2c0d75b4e7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
0fc0de254bc80e54c708fbd0eb0460c730283508b94108e4b2d1d70525ef3fce.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral6
Sample
1a47c4fd5aa52c954123b3871ed1e6cdacf81b1d18e8281d1b0ab304133ee3a8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
1a6ed538d9ee30c5d1988968896c7028f99b24f43e5abbae96cc63281bcd8bed.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral8
Sample
1ac9b17068a19f093e347bafa92112dc8f1a935ba176aadbf58e57f35e4beed7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
1be6fdb2df40e128e25bd4959ae3fa83c634ced9f51ab2994c209dcadc9adde9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral10
Sample
2bbbb9b0cdbb3a1f26ce3357d9119edf008e4894c881351f89989a67d0a192b2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
2cda90e9e87c9db37ba5015909a7efb45fbe3a351ec9ca7a5359204e801dcb33.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral12
Sample
2d58b1a3735269002d5499c67bd32c3b800fd1c44ca78d19ac3d21df84832faa.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
2e966d34801be95eae9a7f1dd5efe3885c234c473d377185f3b7af4dbbb99d2e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
3a0297561d1cab1471cd84e4c5308f19a9a33606784938235c7ff2eaa85d001c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
3a90ad325806107cadbd87ed4825ff967c3535e74433ab04fa6ff30b512b818d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral16
Sample
3e76598b8086857c38e2016dc729fa4879136e46b6f5962ff0b042ef35666b50.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
4a5b5eb5a4e1ba423df24c110fc43f7b3428d2126e99fd9c170b9dfb2baf7236.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral18
Sample
4b482e8492e8c1943330745899214b29bfd2582000371243400d854838dfb88c.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral19
Sample
4bd46a2850788e5697d214dd4409c063b6f9c38c886443211f22fb0ff19bff9c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral20
Sample
4cca8b360d5053a789ea822ab80261dc6f010c1c72b0d449ca8cdcaffd2e2c0a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral22
Sample
5ac2fcc4daab08132ad947ffedcf88286f2af526a260111f3ae00de9ba0a6283.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
5b25182d96ac6fca82ecb8f99198295f45bf8fceea3fb196beb2a4e7bc862714.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
5ddb366eada77b037e23b02034be67099372dad8ab32668381290af66ec4ba46.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral25
Sample
5f1364d24646f22acc7127263adfb401a9c3a4655f9ecb085f931ebc9aaf61bc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral26
Sample
6e0c9935ea61a09f4ced2b9a871b5f21b637a7979b21aa4ccb490a9442182865.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
6ea27426ff47b4abd8a8e53f7d3452c981aa6fe86ca07ef15e45f6f8fcae3108.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral28
Sample
7dad12bd22c31f2618cc56cbd738f1cce5afaea128fcfe1deb18f4ac7366c9d2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
7db9e09e8bdcc45eafbb75b83d57503d11bf54d96c9eaa003fe8e5d518180571.exe
Resource
win10v2004-20250314-en
General
-
Target
4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe
-
Size
1.3MB
-
MD5
3b921ff1f40f6c6182e84a476152aaf3
-
SHA1
19db03733444cca5868939074c002de3d4b10948
-
SHA256
4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7
-
SHA512
2546f5d93d5e9a87416d880cad06a95275a9c441aef6481f5fd74cba8ecfe45d29c4486f2593f9567d5aa3e3d88eeaaf89b15f26da31f91cf869cfdb303c7ccc
-
SSDEEP
24576:V5ZWs+OZVEWry8AFaxtFyar0HteJyUt/1T7fQlbNW6AVDnSwRC4envs:jZB1G8YYFyaQW/1v4QnSwRC4Uvs
Malware Config
Extracted
remcos
���s�÷d
190.6.65.2:25158
microsoft.bnctechnology.space:36546
microsoft.bnctechnology.space:541
-
audio_folder
?§J?°Û¤ù
-
audio_record_time
5
-
connect_delay
60
-
connect_interval
60
-
copy_file
Virtual.exe
-
copy_folder
Oracle
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%Temp%
-
keylog_crypt
true
-
keylog_file
Microsofts.dat
-
keylog_flag
false
-
keylog_folder
Microsoft
-
mouse_option
false
-
mutex
juyrkrgj-UGC846
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
ºI?
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Lin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\juyrkrgj-UGC846 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Oracle\\Virtual.exe\"" Lin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Virtual.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\juyrkrgj-UGC846 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Oracle\\Virtual.exe\"" Virtual.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation 4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation Lin.exe -
Executes dropped EXE 64 IoCs
pid Process 1448 login.exe 516 Lin.exe 5388 Virtual.exe 3320 Virtual.exe 5816 Virtual.exe 4480 Virtual.exe 3912 Virtual.exe 5768 Virtual.exe 1856 Virtual.exe 440 Virtual.exe 3272 Virtual.exe 1544 Virtual.exe 3936 Virtual.exe 3904 Virtual.exe 2984 Virtual.exe 1600 Virtual.exe 4960 Virtual.exe 4824 Virtual.exe 1772 Virtual.exe 1824 Virtual.exe 3416 Virtual.exe 2940 Virtual.exe 4560 Virtual.exe 5184 Virtual.exe 4876 Virtual.exe 1976 Virtual.exe 2916 Virtual.exe 3948 Virtual.exe 4912 Virtual.exe 5620 Virtual.exe 3936 Virtual.exe 1756 Virtual.exe 3016 Virtual.exe 2500 Virtual.exe 1048 Virtual.exe 4304 Virtual.exe 2612 Virtual.exe 4444 Virtual.exe 4460 Virtual.exe 1580 Virtual.exe 3668 Virtual.exe 4400 Virtual.exe 2916 Virtual.exe 4936 Virtual.exe 4620 Virtual.exe 2476 Virtual.exe 5204 Virtual.exe 5768 Virtual.exe 964 Virtual.exe 1720 Virtual.exe 3060 Virtual.exe 1004 Virtual.exe 5512 Virtual.exe 3196 Virtual.exe 1180 Virtual.exe 4960 Virtual.exe 4572 Virtual.exe 4748 Virtual.exe 4824 Virtual.exe 1624 Virtual.exe 1136 Virtual.exe 5684 Virtual.exe 1836 Virtual.exe 1384 Virtual.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juyrkrgj-UGC846 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Oracle\\Virtual.exe\"" Lin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\juyrkrgj-UGC846 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Oracle\\Virtual.exe\"" Lin.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juyrkrgj-UGC846 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Oracle\\Virtual.exe\"" Virtual.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\juyrkrgj-UGC846 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Oracle\\Virtual.exe\"" Virtual.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5388 set thread context of 5760 5388 Virtual.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language login.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Virtual.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Lin.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5388 Virtual.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1448 login.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1448 login.exe 1448 login.exe 1448 login.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4112 wrote to memory of 1448 4112 4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe 87 PID 4112 wrote to memory of 1448 4112 4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe 87 PID 4112 wrote to memory of 1448 4112 4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe 87 PID 4112 wrote to memory of 516 4112 4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe 90 PID 4112 wrote to memory of 516 4112 4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe 90 PID 4112 wrote to memory of 516 4112 4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe 90 PID 1140 wrote to memory of 5388 1140 cmd.exe 95 PID 1140 wrote to memory of 5388 1140 cmd.exe 95 PID 1140 wrote to memory of 5388 1140 cmd.exe 95 PID 5388 wrote to memory of 5760 5388 Virtual.exe 98 PID 5388 wrote to memory of 5760 5388 Virtual.exe 98 PID 5388 wrote to memory of 5760 5388 Virtual.exe 98 PID 5388 wrote to memory of 5760 5388 Virtual.exe 98 PID 3928 wrote to memory of 3320 3928 cmd.exe 101 PID 3928 wrote to memory of 3320 3928 cmd.exe 101 PID 3928 wrote to memory of 3320 3928 cmd.exe 101 PID 4324 wrote to memory of 5816 4324 cmd.exe 102 PID 4324 wrote to memory of 5816 4324 cmd.exe 102 PID 4324 wrote to memory of 5816 4324 cmd.exe 102 PID 980 wrote to memory of 4480 980 cmd.exe 103 PID 980 wrote to memory of 4480 980 cmd.exe 103 PID 980 wrote to memory of 4480 980 cmd.exe 103 PID 516 wrote to memory of 3912 516 Lin.exe 104 PID 516 wrote to memory of 3912 516 Lin.exe 104 PID 516 wrote to memory of 3912 516 Lin.exe 104 PID 2456 wrote to memory of 1856 2456 cmd.exe 113 PID 2456 wrote to memory of 1856 2456 cmd.exe 113 PID 2456 wrote to memory of 1856 2456 cmd.exe 113 PID 3540 wrote to memory of 5768 3540 cmd.exe 112 PID 3540 wrote to memory of 5768 3540 cmd.exe 112 PID 3540 wrote to memory of 5768 3540 cmd.exe 112 PID 5464 wrote to memory of 440 5464 cmd.exe 120 PID 5464 wrote to memory of 440 5464 cmd.exe 120 PID 5464 wrote to memory of 440 5464 cmd.exe 120 PID 4524 wrote to memory of 3272 4524 cmd.exe 121 PID 4524 wrote to memory of 3272 4524 cmd.exe 121 PID 4524 wrote to memory of 3272 4524 cmd.exe 121 PID 5272 wrote to memory of 1544 5272 cmd.exe 127 PID 5272 wrote to memory of 1544 5272 cmd.exe 127 PID 5272 wrote to memory of 1544 5272 cmd.exe 127 PID 3960 wrote to memory of 3936 3960 cmd.exe 128 PID 3960 wrote to memory of 3936 3960 cmd.exe 128 PID 3960 wrote to memory of 3936 3960 cmd.exe 128 PID 1804 wrote to memory of 3904 1804 cmd.exe 134 PID 1804 wrote to memory of 3904 1804 cmd.exe 134 PID 1804 wrote to memory of 3904 1804 cmd.exe 134 PID 1888 wrote to memory of 2984 1888 cmd.exe 135 PID 1888 wrote to memory of 2984 1888 cmd.exe 135 PID 1888 wrote to memory of 2984 1888 cmd.exe 135 PID 2548 wrote to memory of 1600 2548 cmd.exe 140 PID 2548 wrote to memory of 1600 2548 cmd.exe 140 PID 2548 wrote to memory of 1600 2548 cmd.exe 140 PID 3588 wrote to memory of 4960 3588 cmd.exe 141 PID 3588 wrote to memory of 4960 3588 cmd.exe 141 PID 3588 wrote to memory of 4960 3588 cmd.exe 141 PID 1840 wrote to memory of 4824 1840 cmd.exe 146 PID 1840 wrote to memory of 4824 1840 cmd.exe 146 PID 1840 wrote to memory of 4824 1840 cmd.exe 146 PID 3612 wrote to memory of 1772 3612 cmd.exe 147 PID 3612 wrote to memory of 1772 3612 cmd.exe 147 PID 3612 wrote to memory of 1772 3612 cmd.exe 147 PID 1968 wrote to memory of 1824 1968 cmd.exe 152 PID 1968 wrote to memory of 1824 1968 cmd.exe 152 PID 1968 wrote to memory of 1824 1968 cmd.exe 152
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe"C:\Users\Admin\AppData\Local\Temp\4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\login.exe"C:\Users\Admin\AppData\Local\Temp\login.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\Lin.exe"C:\Users\Admin\AppData\Local\Temp\Lin.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"3⤵
- Executes dropped EXE
PID:3912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5388 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:5760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5464 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5272 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5184
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5544
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5196
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:6140
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5544
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:2476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5484
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:180
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5872
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:3196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:4748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5844
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5828
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:5684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5444
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵
- Executes dropped EXE
PID:1384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:2756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:5556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5768
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:2164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:5460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5620
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4072
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:2444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:5148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:5172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:6060
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:6104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5188
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:2612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:5580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:5316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5796
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5604
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:1444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:4988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:2756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:5176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe"1⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exeC:\Users\Admin\AppData\Local\Temp\Oracle\Virtual.exe2⤵PID:3544
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
464KB
MD587ba961523f14b4cd25dfc6a96c1fa8c
SHA188b195f9d4934b170c9ccaa912b3efb362e7cb18
SHA2562b3b023ebdc553863c84edb66c969da68fb5e505a203224ac72855d7359aae30
SHA512be7e65d25525dcea8a871db7a2bc08a45723cd69bf6b292ceb5f751079d64a0e3b19f657f6963f0e8d80ae9a13e981693130699f43b045c4d2da15a86dfa3b17
-
Filesize
968KB
MD52921d9fd9cb1b5fd59534d0a6423bb07
SHA180c39f75e6385d49162302e8bd78d91acefda14f
SHA2562494294241bafe261e88d3ac7345ebe4fc985968ef3294b41f0cfc5855b89df3
SHA5125e49de0ad5315c3489e5c8c8523b378d00be8f74c94ff9e7d73392a480fa4deaa2c75b65749506b1640e555afc666405e5da07f27e94cde3fe64ff230c2d673c