Analysis
-
max time kernel
53s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 00:30
Static task
static1
Behavioral task
behavioral1
Sample
4691c6df862e621e505306b625b29b59.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4691c6df862e621e505306b625b29b59.exe
Resource
win10v2004-20231215-en
General
-
Target
4691c6df862e621e505306b625b29b59.exe
-
Size
1.8MB
-
MD5
4691c6df862e621e505306b625b29b59
-
SHA1
6c25b2d733e5f645948407d3b6f07c0ca4802909
-
SHA256
7fba58d567e0341dabdf555be04ab48a9c60c99893b463842703d58f1fb70290
-
SHA512
81f57290d2a25153b721315e921316fff97d6f34195fa6b388623a02430ede7dbfddad28072d8451efe5047d11f7aab405aa9d26fccbce55e5d7ec019ae52047
-
SSDEEP
49152:3GucJuhuFXK5MATKasY6DwOBfrnvV7UeWta:2luscLyYiwOBpIeWQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 41 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4691c6df862e621e505306b625b29b59.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini 4691c6df862e621e505306b625b29b59.exe File created C:\Windows\assembly\Desktop.ini 4691c6df862e621e505306b625b29b59.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 4691c6df862e621e505306b625b29b59.exe File created C:\Windows\assembly\Desktop.ini 4691c6df862e621e505306b625b29b59.exe File opened for modification C:\Windows\assembly\Desktop.ini 4691c6df862e621e505306b625b29b59.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1400 2460 4691c6df862e621e505306b625b29b59.exe 92 PID 2460 wrote to memory of 1400 2460 4691c6df862e621e505306b625b29b59.exe 92 PID 2460 wrote to memory of 1400 2460 4691c6df862e621e505306b625b29b59.exe 92 PID 1400 wrote to memory of 928 1400 4691c6df862e621e505306b625b29b59.exe 113 PID 1400 wrote to memory of 928 1400 4691c6df862e621e505306b625b29b59.exe 113 PID 1400 wrote to memory of 928 1400 4691c6df862e621e505306b625b29b59.exe 113 PID 928 wrote to memory of 1924 928 svchost.exe 94 PID 928 wrote to memory of 1924 928 svchost.exe 94 PID 928 wrote to memory of 1924 928 svchost.exe 94 PID 1924 wrote to memory of 4004 1924 4691c6df862e621e505306b625b29b59.exe 96 PID 1924 wrote to memory of 4004 1924 4691c6df862e621e505306b625b29b59.exe 96 PID 1924 wrote to memory of 4004 1924 4691c6df862e621e505306b625b29b59.exe 96 PID 4004 wrote to memory of 2912 4004 4691c6df862e621e505306b625b29b59.exe 97 PID 4004 wrote to memory of 2912 4004 4691c6df862e621e505306b625b29b59.exe 97 PID 4004 wrote to memory of 2912 4004 4691c6df862e621e505306b625b29b59.exe 97 PID 2912 wrote to memory of 3784 2912 4691c6df862e621e505306b625b29b59.exe 99 PID 2912 wrote to memory of 3784 2912 4691c6df862e621e505306b625b29b59.exe 99 PID 2912 wrote to memory of 3784 2912 4691c6df862e621e505306b625b29b59.exe 99 PID 3784 wrote to memory of 1652 3784 4691c6df862e621e505306b625b29b59.exe 100 PID 3784 wrote to memory of 1652 3784 4691c6df862e621e505306b625b29b59.exe 100 PID 3784 wrote to memory of 1652 3784 4691c6df862e621e505306b625b29b59.exe 100 PID 1652 wrote to memory of 3140 1652 4691c6df862e621e505306b625b29b59.exe 101 PID 1652 wrote to memory of 3140 1652 4691c6df862e621e505306b625b29b59.exe 101 PID 1652 wrote to memory of 3140 1652 4691c6df862e621e505306b625b29b59.exe 101 PID 3140 wrote to memory of 4268 3140 4691c6df862e621e505306b625b29b59.exe 146 PID 3140 wrote to memory of 4268 3140 4691c6df862e621e505306b625b29b59.exe 146 PID 3140 wrote to memory of 4268 3140 4691c6df862e621e505306b625b29b59.exe 146 PID 4268 wrote to memory of 408 4268 4691c6df862e621e505306b625b29b59.exe 133 PID 4268 wrote to memory of 408 4268 4691c6df862e621e505306b625b29b59.exe 133 PID 4268 wrote to memory of 408 4268 4691c6df862e621e505306b625b29b59.exe 133 PID 408 wrote to memory of 2676 408 4691c6df862e621e505306b625b29b59.exe 108 PID 408 wrote to memory of 2676 408 4691c6df862e621e505306b625b29b59.exe 108 PID 408 wrote to memory of 2676 408 4691c6df862e621e505306b625b29b59.exe 108 PID 2676 wrote to memory of 1600 2676 4691c6df862e621e505306b625b29b59.exe 111 PID 2676 wrote to memory of 1600 2676 4691c6df862e621e505306b625b29b59.exe 111 PID 2676 wrote to memory of 1600 2676 4691c6df862e621e505306b625b29b59.exe 111 PID 1600 wrote to memory of 1504 1600 4691c6df862e621e505306b625b29b59.exe 151 PID 1600 wrote to memory of 1504 1600 4691c6df862e621e505306b625b29b59.exe 151 PID 1600 wrote to memory of 1504 1600 4691c6df862e621e505306b625b29b59.exe 151 PID 1504 wrote to memory of 4620 1504 4691c6df862e621e505306b625b29b59.exe 114 PID 1504 wrote to memory of 4620 1504 4691c6df862e621e505306b625b29b59.exe 114 PID 1504 wrote to memory of 4620 1504 4691c6df862e621e505306b625b29b59.exe 114 PID 4620 wrote to memory of 1976 4620 4691c6df862e621e505306b625b29b59.exe 182 PID 4620 wrote to memory of 1976 4620 4691c6df862e621e505306b625b29b59.exe 182 PID 4620 wrote to memory of 1976 4620 4691c6df862e621e505306b625b29b59.exe 182 PID 1976 wrote to memory of 4976 1976 4691c6df862e621e505306b625b29b59.exe 117 PID 1976 wrote to memory of 4976 1976 4691c6df862e621e505306b625b29b59.exe 117 PID 1976 wrote to memory of 4976 1976 4691c6df862e621e505306b625b29b59.exe 117 PID 4976 wrote to memory of 1012 4976 4691c6df862e621e505306b625b29b59.exe 118 PID 4976 wrote to memory of 1012 4976 4691c6df862e621e505306b625b29b59.exe 118 PID 4976 wrote to memory of 1012 4976 4691c6df862e621e505306b625b29b59.exe 118 PID 1012 wrote to memory of 2840 1012 4691c6df862e621e505306b625b29b59.exe 119 PID 1012 wrote to memory of 2840 1012 4691c6df862e621e505306b625b29b59.exe 119 PID 1012 wrote to memory of 2840 1012 4691c6df862e621e505306b625b29b59.exe 119 PID 2840 wrote to memory of 4276 2840 4691c6df862e621e505306b625b29b59.exe 120 PID 2840 wrote to memory of 4276 2840 4691c6df862e621e505306b625b29b59.exe 120 PID 2840 wrote to memory of 4276 2840 4691c6df862e621e505306b625b29b59.exe 120 PID 4276 wrote to memory of 3492 4276 4691c6df862e621e505306b625b29b59.exe 208 PID 4276 wrote to memory of 3492 4276 4691c6df862e621e505306b625b29b59.exe 208 PID 4276 wrote to memory of 3492 4276 4691c6df862e621e505306b625b29b59.exe 208 PID 3492 wrote to memory of 1896 3492 4691c6df862e621e505306b625b29b59.exe 122 PID 3492 wrote to memory of 1896 3492 4691c6df862e621e505306b625b29b59.exe 122 PID 3492 wrote to memory of 1896 3492 4691c6df862e621e505306b625b29b59.exe 122 PID 1896 wrote to memory of 3156 1896 4691c6df862e621e505306b625b29b59.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"3⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"7⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"8⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"9⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"10⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"11⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"12⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"13⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"14⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"15⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"16⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"17⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"18⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"19⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"20⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"21⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"22⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"23⤵
- Checks computer location settings
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"24⤵
- Checks computer location settings
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"25⤵
- Checks computer location settings
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"26⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"27⤵
- Checks computer location settings
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"28⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"29⤵
- Checks computer location settings
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"30⤵
- Checks computer location settings
PID:212 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"31⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"32⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"33⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"34⤵
- Checks computer location settings
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"35⤵
- Checks computer location settings
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"36⤵
- Checks computer location settings
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"37⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"38⤵
- Checks computer location settings
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"39⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"40⤵
- Checks computer location settings
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"41⤵
- Checks computer location settings
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"42⤵
- Checks computer location settings
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"43⤵
- Checks computer location settings
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"44⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"45⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"46⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"47⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"48⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"49⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"50⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"51⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"52⤵
- Checks computer location settings
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"53⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"54⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"55⤵
- Checks computer location settings
PID:232 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"56⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"57⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"58⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"59⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"60⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"61⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"62⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"63⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"64⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"65⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"66⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"67⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"68⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"69⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"70⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"71⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"72⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"73⤵
- Checks computer location settings
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"74⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"75⤵
- Checks computer location settings
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"76⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"77⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"78⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"79⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"80⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"81⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"82⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"83⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"84⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"85⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"86⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"87⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"88⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"89⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"90⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"91⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"92⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"93⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"94⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"95⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"96⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"97⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"98⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"99⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"100⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"101⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"102⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"103⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"104⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"105⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"106⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"107⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"108⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"109⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"110⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"111⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"112⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"113⤵
- Checks computer location settings
PID:400 -
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"114⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"115⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"116⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"117⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"118⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"119⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"120⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"121⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"C:\Users\Admin\AppData\Local\Temp\4691c6df862e621e505306b625b29b59.exe"122⤵PID:2548
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-