Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2023 02:58
Static task
static1
Behavioral task
behavioral1
Sample
ca92f97056c0aaffe877e7ab07678460.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ca92f97056c0aaffe877e7ab07678460.exe
Resource
win10v2004-20231023-en
General
-
Target
ca92f97056c0aaffe877e7ab07678460.exe
-
Size
6KB
-
MD5
ca92f97056c0aaffe877e7ab07678460
-
SHA1
15fc64124a6da883377754bbc3d50cceee604831
-
SHA256
a9f9e14e404260fd55037f2aed8a878e0123b4a79d0d818de9175274c6b03d57
-
SHA512
0523d0f16da2235dde146a46a1f97d9a22663bad38ff2c60134ac7c1f1bc9d906899b9db694a5f8a80500f066f1974daef526c5d5467e4ce99f3d06d3490c716
-
SSDEEP
96:+kc7e4lSTVqEJNwoXhuV7lrnhtintz7XBzNt:me4eNjhG7l65bD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation ca92f97056c0aaffe877e7ab07678460.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2768 ca92f97056c0aaffe877e7ab07678460.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2768 wrote to memory of 3016 2768 ca92f97056c0aaffe877e7ab07678460.exe 87 PID 2768 wrote to memory of 3016 2768 ca92f97056c0aaffe877e7ab07678460.exe 87 PID 2768 wrote to memory of 3016 2768 ca92f97056c0aaffe877e7ab07678460.exe 87 PID 2768 wrote to memory of 2644 2768 ca92f97056c0aaffe877e7ab07678460.exe 88 PID 2768 wrote to memory of 2644 2768 ca92f97056c0aaffe877e7ab07678460.exe 88 PID 2768 wrote to memory of 2644 2768 ca92f97056c0aaffe877e7ab07678460.exe 88 PID 2768 wrote to memory of 4620 2768 ca92f97056c0aaffe877e7ab07678460.exe 91 PID 2768 wrote to memory of 4620 2768 ca92f97056c0aaffe877e7ab07678460.exe 91 PID 2768 wrote to memory of 4620 2768 ca92f97056c0aaffe877e7ab07678460.exe 91 PID 2768 wrote to memory of 1200 2768 ca92f97056c0aaffe877e7ab07678460.exe 92 PID 2768 wrote to memory of 1200 2768 ca92f97056c0aaffe877e7ab07678460.exe 92 PID 2768 wrote to memory of 1200 2768 ca92f97056c0aaffe877e7ab07678460.exe 92 PID 2768 wrote to memory of 992 2768 ca92f97056c0aaffe877e7ab07678460.exe 96 PID 2768 wrote to memory of 992 2768 ca92f97056c0aaffe877e7ab07678460.exe 96 PID 2768 wrote to memory of 992 2768 ca92f97056c0aaffe877e7ab07678460.exe 96 PID 2768 wrote to memory of 3052 2768 ca92f97056c0aaffe877e7ab07678460.exe 101 PID 2768 wrote to memory of 3052 2768 ca92f97056c0aaffe877e7ab07678460.exe 101 PID 2768 wrote to memory of 3052 2768 ca92f97056c0aaffe877e7ab07678460.exe 101 PID 2768 wrote to memory of 4960 2768 ca92f97056c0aaffe877e7ab07678460.exe 107 PID 2768 wrote to memory of 4960 2768 ca92f97056c0aaffe877e7ab07678460.exe 107 PID 2768 wrote to memory of 4960 2768 ca92f97056c0aaffe877e7ab07678460.exe 107 PID 2768 wrote to memory of 4320 2768 ca92f97056c0aaffe877e7ab07678460.exe 151 PID 2768 wrote to memory of 4320 2768 ca92f97056c0aaffe877e7ab07678460.exe 151 PID 2768 wrote to memory of 4320 2768 ca92f97056c0aaffe877e7ab07678460.exe 151 PID 2768 wrote to memory of 2876 2768 ca92f97056c0aaffe877e7ab07678460.exe 111 PID 2768 wrote to memory of 2876 2768 ca92f97056c0aaffe877e7ab07678460.exe 111 PID 2768 wrote to memory of 2876 2768 ca92f97056c0aaffe877e7ab07678460.exe 111 PID 2768 wrote to memory of 1616 2768 ca92f97056c0aaffe877e7ab07678460.exe 114 PID 2768 wrote to memory of 1616 2768 ca92f97056c0aaffe877e7ab07678460.exe 114 PID 2768 wrote to memory of 1616 2768 ca92f97056c0aaffe877e7ab07678460.exe 114 PID 2768 wrote to memory of 4648 2768 ca92f97056c0aaffe877e7ab07678460.exe 115 PID 2768 wrote to memory of 4648 2768 ca92f97056c0aaffe877e7ab07678460.exe 115 PID 2768 wrote to memory of 4648 2768 ca92f97056c0aaffe877e7ab07678460.exe 115 PID 2768 wrote to memory of 1740 2768 ca92f97056c0aaffe877e7ab07678460.exe 119 PID 2768 wrote to memory of 1740 2768 ca92f97056c0aaffe877e7ab07678460.exe 119 PID 2768 wrote to memory of 1740 2768 ca92f97056c0aaffe877e7ab07678460.exe 119 PID 2768 wrote to memory of 3248 2768 ca92f97056c0aaffe877e7ab07678460.exe 143 PID 2768 wrote to memory of 3248 2768 ca92f97056c0aaffe877e7ab07678460.exe 143 PID 2768 wrote to memory of 3248 2768 ca92f97056c0aaffe877e7ab07678460.exe 143 PID 2768 wrote to memory of 2128 2768 ca92f97056c0aaffe877e7ab07678460.exe 123 PID 2768 wrote to memory of 2128 2768 ca92f97056c0aaffe877e7ab07678460.exe 123 PID 2768 wrote to memory of 2128 2768 ca92f97056c0aaffe877e7ab07678460.exe 123 PID 2768 wrote to memory of 3544 2768 ca92f97056c0aaffe877e7ab07678460.exe 126 PID 2768 wrote to memory of 3544 2768 ca92f97056c0aaffe877e7ab07678460.exe 126 PID 2768 wrote to memory of 3544 2768 ca92f97056c0aaffe877e7ab07678460.exe 126 PID 2768 wrote to memory of 1500 2768 ca92f97056c0aaffe877e7ab07678460.exe 184 PID 2768 wrote to memory of 1500 2768 ca92f97056c0aaffe877e7ab07678460.exe 184 PID 2768 wrote to memory of 1500 2768 ca92f97056c0aaffe877e7ab07678460.exe 184 PID 2768 wrote to memory of 4088 2768 ca92f97056c0aaffe877e7ab07678460.exe 129 PID 2768 wrote to memory of 4088 2768 ca92f97056c0aaffe877e7ab07678460.exe 129 PID 2768 wrote to memory of 4088 2768 ca92f97056c0aaffe877e7ab07678460.exe 129 PID 2768 wrote to memory of 3868 2768 ca92f97056c0aaffe877e7ab07678460.exe 131 PID 2768 wrote to memory of 3868 2768 ca92f97056c0aaffe877e7ab07678460.exe 131 PID 2768 wrote to memory of 3868 2768 ca92f97056c0aaffe877e7ab07678460.exe 131 PID 2768 wrote to memory of 2224 2768 ca92f97056c0aaffe877e7ab07678460.exe 133 PID 2768 wrote to memory of 2224 2768 ca92f97056c0aaffe877e7ab07678460.exe 133 PID 2768 wrote to memory of 2224 2768 ca92f97056c0aaffe877e7ab07678460.exe 133 PID 2768 wrote to memory of 3856 2768 ca92f97056c0aaffe877e7ab07678460.exe 136 PID 2768 wrote to memory of 3856 2768 ca92f97056c0aaffe877e7ab07678460.exe 136 PID 2768 wrote to memory of 3856 2768 ca92f97056c0aaffe877e7ab07678460.exe 136 PID 2768 wrote to memory of 3012 2768 ca92f97056c0aaffe877e7ab07678460.exe 138 PID 2768 wrote to memory of 3012 2768 ca92f97056c0aaffe877e7ab07678460.exe 138 PID 2768 wrote to memory of 3012 2768 ca92f97056c0aaffe877e7ab07678460.exe 138 PID 2768 wrote to memory of 4568 2768 ca92f97056c0aaffe877e7ab07678460.exe 140
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"1⤵
- Checks computer location settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1200
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:992
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4088
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3856
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:68
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3388
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3088
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3252
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:896
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3788
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:208
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3096
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1228
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3344
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1148
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3288
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:712
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:380
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3356
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe"C:\Users\Admin\AppData\Local\Temp\ca92f97056c0aaffe877e7ab07678460.exe" fc2⤵PID:2352
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv T9QxqSRJC0myLzwrvRMJBw.0.21⤵PID:3248
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:4320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ca92f97056c0aaffe877e7ab07678460.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521