Analysis
-
max time kernel
145s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
1f1356e47db8750bc25e351595545081d60d5d7bc4e4e9512886db00b3503de5.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1f1356e47db8750bc25e351595545081d60d5d7bc4e4e9512886db00b3503de5.exe
Resource
win10v2004-20240508-en
General
-
Target
1f1356e47db8750bc25e351595545081d60d5d7bc4e4e9512886db00b3503de5.exe
-
Size
1.2MB
-
MD5
2a2a64a439b88a7e6ebeb1363e3e7b5a
-
SHA1
23cbaaae2056d0cd813ca6087f5533ee3e1256b5
-
SHA256
1f1356e47db8750bc25e351595545081d60d5d7bc4e4e9512886db00b3503de5
-
SHA512
20a0482f5367c21d4c4bad3cbedf855ed7ae4e2f6b8fadbe695287ba27494eb9c2ba2c50be0f08c9b955ec444f93ac7f9970d200ffefb80c1b537de5a5a45765
-
SSDEEP
24576:1qylFH50Dv6RwyeQvt6ot0h9HyrOgiruAA:IylFHUv6ReIt0jSrOq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 465WG.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 8W5UV.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 90QG2.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation HTR0R.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation IKAZU.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation YL6QL.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation O357H.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation S1336.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation B3C40.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 94490.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation C37ID.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation G57B0.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 1FJ72.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 6DGW5.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 6391U.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation RNTT3.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 75969.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation PCXS2.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation PE86F.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation QD47Z.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 335G5.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 502TP.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 6G6C5.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 7R2UM.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 3D709.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 082X1.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 7FI9Z.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 1U9TY.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation YOU1K.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 1B196.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 5Q635.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 06K58.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation TR32E.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation J20V5.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 7M1T5.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 63E81.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation WKSTY.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 7G8LS.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation VJR91.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 11054.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 0FS2O.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 0B072.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 9P9C4.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation HFQM0.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 10957.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation IU8H9.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation C0DC0.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 8HUI0.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation R8HF3.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation ZA52H.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation PBYU5.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation N3SM9.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 6CO21.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 5C9B9.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 0K5BY.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation UCOM9.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation K6H3F.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 2K4B2.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 78NC1.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation S1500.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation HB61P.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 6FKK2.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation W2B8X.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 8TSCX.exe -
Executes dropped EXE 64 IoCs
pid Process 4420 9WJ57.exe 4824 0HTTV.exe 4200 05N9G.exe 456 2JPP8.exe 996 45690.exe 4808 90QG2.exe 2796 ME3EN.exe 3256 VB78R.exe 2292 06SY9.exe 2000 6FKK2.exe 1116 07819.exe 2680 4Y7U9.exe 3356 1U9TY.exe 2844 YOU1K.exe 1624 K6H3F.exe 4616 75969.exe 856 N3SM9.exe 832 129NX.exe 4660 7BFWG.exe 632 6DGW5.exe 4088 76449.exe 2796 JO8L5.exe 3864 465WG.exe 3672 440W8.exe 1892 PCXS2.exe 4564 SQO11.exe 2016 06P74.exe 4372 PE86F.exe 376 L7YAQ.exe 3420 FAC54.exe 3628 P3TTR.exe 1412 7BB4X.exe 4088 2G81X.exe 3840 315B9.exe 1544 HTR0R.exe 3856 5FTPJ.exe 1248 W2B8X.exe 2940 4R93B.exe 4656 IKAZU.exe 4160 Y52Y1.exe 4696 SKN52.exe 4960 C8N3O.exe 1432 KSVLV.exe 1740 028S4.exe 1556 1B196.exe 3420 3S42X.exe 1420 5Q635.exe 2604 U2375.exe 928 6CO21.exe 1296 84QHW.exe 2796 335G5.exe 2384 H6ZR0.exe 512 246T5.exe 3444 WI212.exe 4628 37NO4.exe 1716 8TSCX.exe 4060 AWD68.exe 2016 14K0V.exe 2652 7P12M.exe 5092 06K58.exe 3588 37JA8.exe 3980 721I7.exe 3764 2K4B2.exe 3508 85DV7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 448 1f1356e47db8750bc25e351595545081d60d5d7bc4e4e9512886db00b3503de5.exe 448 1f1356e47db8750bc25e351595545081d60d5d7bc4e4e9512886db00b3503de5.exe 4420 9WJ57.exe 4420 9WJ57.exe 4824 0HTTV.exe 4824 0HTTV.exe 4200 05N9G.exe 4200 05N9G.exe 456 2JPP8.exe 456 2JPP8.exe 996 45690.exe 996 45690.exe 4808 90QG2.exe 4808 90QG2.exe 2796 ME3EN.exe 2796 ME3EN.exe 3256 VB78R.exe 3256 VB78R.exe 2292 06SY9.exe 2292 06SY9.exe 2000 6FKK2.exe 2000 6FKK2.exe 1116 07819.exe 1116 07819.exe 2680 4Y7U9.exe 2680 4Y7U9.exe 3356 1U9TY.exe 3356 1U9TY.exe 2844 YOU1K.exe 2844 YOU1K.exe 1624 K6H3F.exe 1624 K6H3F.exe 4616 75969.exe 4616 75969.exe 856 N3SM9.exe 856 N3SM9.exe 832 129NX.exe 832 129NX.exe 4660 7BFWG.exe 4660 7BFWG.exe 632 6DGW5.exe 632 6DGW5.exe 4088 76449.exe 4088 76449.exe 2796 JO8L5.exe 2796 JO8L5.exe 3864 465WG.exe 3864 465WG.exe 3672 440W8.exe 3672 440W8.exe 1892 PCXS2.exe 1892 PCXS2.exe 4564 SQO11.exe 4564 SQO11.exe 2016 06P74.exe 2016 06P74.exe 4372 PE86F.exe 4372 PE86F.exe 376 L7YAQ.exe 376 L7YAQ.exe 3420 FAC54.exe 3420 FAC54.exe 3628 P3TTR.exe 3628 P3TTR.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 448 wrote to memory of 4420 448 1f1356e47db8750bc25e351595545081d60d5d7bc4e4e9512886db00b3503de5.exe 83 PID 448 wrote to memory of 4420 448 1f1356e47db8750bc25e351595545081d60d5d7bc4e4e9512886db00b3503de5.exe 83 PID 448 wrote to memory of 4420 448 1f1356e47db8750bc25e351595545081d60d5d7bc4e4e9512886db00b3503de5.exe 83 PID 4420 wrote to memory of 4824 4420 9WJ57.exe 84 PID 4420 wrote to memory of 4824 4420 9WJ57.exe 84 PID 4420 wrote to memory of 4824 4420 9WJ57.exe 84 PID 4824 wrote to memory of 4200 4824 0HTTV.exe 87 PID 4824 wrote to memory of 4200 4824 0HTTV.exe 87 PID 4824 wrote to memory of 4200 4824 0HTTV.exe 87 PID 4200 wrote to memory of 456 4200 05N9G.exe 89 PID 4200 wrote to memory of 456 4200 05N9G.exe 89 PID 4200 wrote to memory of 456 4200 05N9G.exe 89 PID 456 wrote to memory of 996 456 2JPP8.exe 90 PID 456 wrote to memory of 996 456 2JPP8.exe 90 PID 456 wrote to memory of 996 456 2JPP8.exe 90 PID 996 wrote to memory of 4808 996 45690.exe 91 PID 996 wrote to memory of 4808 996 45690.exe 91 PID 996 wrote to memory of 4808 996 45690.exe 91 PID 4808 wrote to memory of 2796 4808 90QG2.exe 92 PID 4808 wrote to memory of 2796 4808 90QG2.exe 92 PID 4808 wrote to memory of 2796 4808 90QG2.exe 92 PID 2796 wrote to memory of 3256 2796 ME3EN.exe 93 PID 2796 wrote to memory of 3256 2796 ME3EN.exe 93 PID 2796 wrote to memory of 3256 2796 ME3EN.exe 93 PID 3256 wrote to memory of 2292 3256 VB78R.exe 94 PID 3256 wrote to memory of 2292 3256 VB78R.exe 94 PID 3256 wrote to memory of 2292 3256 VB78R.exe 94 PID 2292 wrote to memory of 2000 2292 06SY9.exe 95 PID 2292 wrote to memory of 2000 2292 06SY9.exe 95 PID 2292 wrote to memory of 2000 2292 06SY9.exe 95 PID 2000 wrote to memory of 1116 2000 6FKK2.exe 96 PID 2000 wrote to memory of 1116 2000 6FKK2.exe 96 PID 2000 wrote to memory of 1116 2000 6FKK2.exe 96 PID 1116 wrote to memory of 2680 1116 07819.exe 97 PID 1116 wrote to memory of 2680 1116 07819.exe 97 PID 1116 wrote to memory of 2680 1116 07819.exe 97 PID 2680 wrote to memory of 3356 2680 4Y7U9.exe 100 PID 2680 wrote to memory of 3356 2680 4Y7U9.exe 100 PID 2680 wrote to memory of 3356 2680 4Y7U9.exe 100 PID 3356 wrote to memory of 2844 3356 1U9TY.exe 101 PID 3356 wrote to memory of 2844 3356 1U9TY.exe 101 PID 3356 wrote to memory of 2844 3356 1U9TY.exe 101 PID 2844 wrote to memory of 1624 2844 YOU1K.exe 102 PID 2844 wrote to memory of 1624 2844 YOU1K.exe 102 PID 2844 wrote to memory of 1624 2844 YOU1K.exe 102 PID 1624 wrote to memory of 4616 1624 K6H3F.exe 104 PID 1624 wrote to memory of 4616 1624 K6H3F.exe 104 PID 1624 wrote to memory of 4616 1624 K6H3F.exe 104 PID 4616 wrote to memory of 856 4616 75969.exe 106 PID 4616 wrote to memory of 856 4616 75969.exe 106 PID 4616 wrote to memory of 856 4616 75969.exe 106 PID 856 wrote to memory of 832 856 N3SM9.exe 107 PID 856 wrote to memory of 832 856 N3SM9.exe 107 PID 856 wrote to memory of 832 856 N3SM9.exe 107 PID 832 wrote to memory of 4660 832 129NX.exe 108 PID 832 wrote to memory of 4660 832 129NX.exe 108 PID 832 wrote to memory of 4660 832 129NX.exe 108 PID 4660 wrote to memory of 632 4660 7BFWG.exe 110 PID 4660 wrote to memory of 632 4660 7BFWG.exe 110 PID 4660 wrote to memory of 632 4660 7BFWG.exe 110 PID 632 wrote to memory of 4088 632 6DGW5.exe 128 PID 632 wrote to memory of 4088 632 6DGW5.exe 128 PID 632 wrote to memory of 4088 632 6DGW5.exe 128 PID 4088 wrote to memory of 2796 4088 76449.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f1356e47db8750bc25e351595545081d60d5d7bc4e4e9512886db00b3503de5.exe"C:\Users\Admin\AppData\Local\Temp\1f1356e47db8750bc25e351595545081d60d5d7bc4e4e9512886db00b3503de5.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\9WJ57.exe"C:\Users\Admin\AppData\Local\Temp\9WJ57.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\0HTTV.exe"C:\Users\Admin\AppData\Local\Temp\0HTTV.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\05N9G.exe"C:\Users\Admin\AppData\Local\Temp\05N9G.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\2JPP8.exe"C:\Users\Admin\AppData\Local\Temp\2JPP8.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\45690.exe"C:\Users\Admin\AppData\Local\Temp\45690.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\90QG2.exe"C:\Users\Admin\AppData\Local\Temp\90QG2.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\ME3EN.exe"C:\Users\Admin\AppData\Local\Temp\ME3EN.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\VB78R.exe"C:\Users\Admin\AppData\Local\Temp\VB78R.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\06SY9.exe"C:\Users\Admin\AppData\Local\Temp\06SY9.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\6FKK2.exe"C:\Users\Admin\AppData\Local\Temp\6FKK2.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\07819.exe"C:\Users\Admin\AppData\Local\Temp\07819.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\4Y7U9.exe"C:\Users\Admin\AppData\Local\Temp\4Y7U9.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\1U9TY.exe"C:\Users\Admin\AppData\Local\Temp\1U9TY.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\YOU1K.exe"C:\Users\Admin\AppData\Local\Temp\YOU1K.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\K6H3F.exe"C:\Users\Admin\AppData\Local\Temp\K6H3F.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\75969.exe"C:\Users\Admin\AppData\Local\Temp\75969.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\N3SM9.exe"C:\Users\Admin\AppData\Local\Temp\N3SM9.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\129NX.exe"C:\Users\Admin\AppData\Local\Temp\129NX.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\7BFWG.exe"C:\Users\Admin\AppData\Local\Temp\7BFWG.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\6DGW5.exe"C:\Users\Admin\AppData\Local\Temp\6DGW5.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\76449.exe"C:\Users\Admin\AppData\Local\Temp\76449.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\JO8L5.exe"C:\Users\Admin\AppData\Local\Temp\JO8L5.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\465WG.exe"C:\Users\Admin\AppData\Local\Temp\465WG.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\440W8.exe"C:\Users\Admin\AppData\Local\Temp\440W8.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\PCXS2.exe"C:\Users\Admin\AppData\Local\Temp\PCXS2.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\SQO11.exe"C:\Users\Admin\AppData\Local\Temp\SQO11.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\06P74.exe"C:\Users\Admin\AppData\Local\Temp\06P74.exe"28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\PE86F.exe"C:\Users\Admin\AppData\Local\Temp\PE86F.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\L7YAQ.exe"C:\Users\Admin\AppData\Local\Temp\L7YAQ.exe"30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:376 -
C:\Users\Admin\AppData\Local\Temp\FAC54.exe"C:\Users\Admin\AppData\Local\Temp\FAC54.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\P3TTR.exe"C:\Users\Admin\AppData\Local\Temp\P3TTR.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\7BB4X.exe"C:\Users\Admin\AppData\Local\Temp\7BB4X.exe"33⤵
- Executes dropped EXE
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\2G81X.exe"C:\Users\Admin\AppData\Local\Temp\2G81X.exe"34⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\315B9.exe"C:\Users\Admin\AppData\Local\Temp\315B9.exe"35⤵
- Executes dropped EXE
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\HTR0R.exe"C:\Users\Admin\AppData\Local\Temp\HTR0R.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\5FTPJ.exe"C:\Users\Admin\AppData\Local\Temp\5FTPJ.exe"37⤵
- Executes dropped EXE
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\W2B8X.exe"C:\Users\Admin\AppData\Local\Temp\W2B8X.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\4R93B.exe"C:\Users\Admin\AppData\Local\Temp\4R93B.exe"39⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\IKAZU.exe"C:\Users\Admin\AppData\Local\Temp\IKAZU.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\Y52Y1.exe"C:\Users\Admin\AppData\Local\Temp\Y52Y1.exe"41⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\SKN52.exe"C:\Users\Admin\AppData\Local\Temp\SKN52.exe"42⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\C8N3O.exe"C:\Users\Admin\AppData\Local\Temp\C8N3O.exe"43⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\KSVLV.exe"C:\Users\Admin\AppData\Local\Temp\KSVLV.exe"44⤵
- Executes dropped EXE
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\028S4.exe"C:\Users\Admin\AppData\Local\Temp\028S4.exe"45⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\1B196.exe"C:\Users\Admin\AppData\Local\Temp\1B196.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\3S42X.exe"C:\Users\Admin\AppData\Local\Temp\3S42X.exe"47⤵
- Executes dropped EXE
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\5Q635.exe"C:\Users\Admin\AppData\Local\Temp\5Q635.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\U2375.exe"C:\Users\Admin\AppData\Local\Temp\U2375.exe"49⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\6CO21.exe"C:\Users\Admin\AppData\Local\Temp\6CO21.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:928 -
C:\Users\Admin\AppData\Local\Temp\84QHW.exe"C:\Users\Admin\AppData\Local\Temp\84QHW.exe"51⤵
- Executes dropped EXE
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\335G5.exe"C:\Users\Admin\AppData\Local\Temp\335G5.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\H6ZR0.exe"C:\Users\Admin\AppData\Local\Temp\H6ZR0.exe"53⤵
- Executes dropped EXE
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\246T5.exe"C:\Users\Admin\AppData\Local\Temp\246T5.exe"54⤵
- Executes dropped EXE
PID:512 -
C:\Users\Admin\AppData\Local\Temp\WI212.exe"C:\Users\Admin\AppData\Local\Temp\WI212.exe"55⤵
- Executes dropped EXE
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\37NO4.exe"C:\Users\Admin\AppData\Local\Temp\37NO4.exe"56⤵
- Executes dropped EXE
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\8TSCX.exe"C:\Users\Admin\AppData\Local\Temp\8TSCX.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\AWD68.exe"C:\Users\Admin\AppData\Local\Temp\AWD68.exe"58⤵
- Executes dropped EXE
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\14K0V.exe"C:\Users\Admin\AppData\Local\Temp\14K0V.exe"59⤵
- Executes dropped EXE
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\7P12M.exe"C:\Users\Admin\AppData\Local\Temp\7P12M.exe"60⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\06K58.exe"C:\Users\Admin\AppData\Local\Temp\06K58.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\37JA8.exe"C:\Users\Admin\AppData\Local\Temp\37JA8.exe"62⤵
- Executes dropped EXE
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\721I7.exe"C:\Users\Admin\AppData\Local\Temp\721I7.exe"63⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\2K4B2.exe"C:\Users\Admin\AppData\Local\Temp\2K4B2.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\85DV7.exe"C:\Users\Admin\AppData\Local\Temp\85DV7.exe"65⤵
- Executes dropped EXE
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\87Q0F.exe"C:\Users\Admin\AppData\Local\Temp\87Q0F.exe"66⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\S1500.exe"C:\Users\Admin\AppData\Local\Temp\S1500.exe"67⤵
- Checks computer location settings
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\7ZLE8.exe"C:\Users\Admin\AppData\Local\Temp\7ZLE8.exe"68⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\8W5UV.exe"C:\Users\Admin\AppData\Local\Temp\8W5UV.exe"69⤵
- Checks computer location settings
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\NMX54.exe"C:\Users\Admin\AppData\Local\Temp\NMX54.exe"70⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\5C9B9.exe"C:\Users\Admin\AppData\Local\Temp\5C9B9.exe"71⤵
- Checks computer location settings
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\56F54.exe"C:\Users\Admin\AppData\Local\Temp\56F54.exe"72⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\A8XA6.exe"C:\Users\Admin\AppData\Local\Temp\A8XA6.exe"73⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\2BB37.exe"C:\Users\Admin\AppData\Local\Temp\2BB37.exe"74⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\M1W7P.exe"C:\Users\Admin\AppData\Local\Temp\M1W7P.exe"75⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\502TP.exe"C:\Users\Admin\AppData\Local\Temp\502TP.exe"76⤵
- Checks computer location settings
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\5F4CE.exe"C:\Users\Admin\AppData\Local\Temp\5F4CE.exe"77⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\0434R.exe"C:\Users\Admin\AppData\Local\Temp\0434R.exe"78⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\0254G.exe"C:\Users\Admin\AppData\Local\Temp\0254G.exe"79⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\B3C40.exe"C:\Users\Admin\AppData\Local\Temp\B3C40.exe"80⤵
- Checks computer location settings
PID:632 -
C:\Users\Admin\AppData\Local\Temp\FS076.exe"C:\Users\Admin\AppData\Local\Temp\FS076.exe"81⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\H8055.exe"C:\Users\Admin\AppData\Local\Temp\H8055.exe"82⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\07326.exe"C:\Users\Admin\AppData\Local\Temp\07326.exe"83⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\LEZ8M.exe"C:\Users\Admin\AppData\Local\Temp\LEZ8M.exe"84⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\364HQ.exe"C:\Users\Admin\AppData\Local\Temp\364HQ.exe"85⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\Q0A10.exe"C:\Users\Admin\AppData\Local\Temp\Q0A10.exe"86⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\78NC1.exe"C:\Users\Admin\AppData\Local\Temp\78NC1.exe"87⤵
- Checks computer location settings
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\2O1PJ.exe"C:\Users\Admin\AppData\Local\Temp\2O1PJ.exe"88⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\YL6QL.exe"C:\Users\Admin\AppData\Local\Temp\YL6QL.exe"89⤵
- Checks computer location settings
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\TR32E.exe"C:\Users\Admin\AppData\Local\Temp\TR32E.exe"90⤵
- Checks computer location settings
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\579BG.exe"C:\Users\Admin\AppData\Local\Temp\579BG.exe"91⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\6G862.exe"C:\Users\Admin\AppData\Local\Temp\6G862.exe"92⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\EZG47.exe"C:\Users\Admin\AppData\Local\Temp\EZG47.exe"93⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\42129.exe"C:\Users\Admin\AppData\Local\Temp\42129.exe"94⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\B1T44.exe"C:\Users\Admin\AppData\Local\Temp\B1T44.exe"95⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\E2ZL0.exe"C:\Users\Admin\AppData\Local\Temp\E2ZL0.exe"96⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\A426N.exe"C:\Users\Admin\AppData\Local\Temp\A426N.exe"97⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\63E81.exe"C:\Users\Admin\AppData\Local\Temp\63E81.exe"98⤵
- Checks computer location settings
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\32PU6.exe"C:\Users\Admin\AppData\Local\Temp\32PU6.exe"99⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\GI63Y.exe"C:\Users\Admin\AppData\Local\Temp\GI63Y.exe"100⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\57OI3.exe"C:\Users\Admin\AppData\Local\Temp\57OI3.exe"101⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\5S0V3.exe"C:\Users\Admin\AppData\Local\Temp\5S0V3.exe"102⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\WKSTY.exe"C:\Users\Admin\AppData\Local\Temp\WKSTY.exe"103⤵
- Checks computer location settings
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\O357H.exe"C:\Users\Admin\AppData\Local\Temp\O357H.exe"104⤵
- Checks computer location settings
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\R3U44.exe"C:\Users\Admin\AppData\Local\Temp\R3U44.exe"105⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\0B072.exe"C:\Users\Admin\AppData\Local\Temp\0B072.exe"106⤵
- Checks computer location settings
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\69DX8.exe"C:\Users\Admin\AppData\Local\Temp\69DX8.exe"107⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\JMK8X.exe"C:\Users\Admin\AppData\Local\Temp\JMK8X.exe"108⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\6391U.exe"C:\Users\Admin\AppData\Local\Temp\6391U.exe"109⤵
- Checks computer location settings
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\17D8V.exe"C:\Users\Admin\AppData\Local\Temp\17D8V.exe"110⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\550SU.exe"C:\Users\Admin\AppData\Local\Temp\550SU.exe"111⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\VPIR3.exe"C:\Users\Admin\AppData\Local\Temp\VPIR3.exe"112⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\J20V5.exe"C:\Users\Admin\AppData\Local\Temp\J20V5.exe"113⤵
- Checks computer location settings
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\B3D05.exe"C:\Users\Admin\AppData\Local\Temp\B3D05.exe"114⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\UJIX3.exe"C:\Users\Admin\AppData\Local\Temp\UJIX3.exe"115⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\IU8H9.exe"C:\Users\Admin\AppData\Local\Temp\IU8H9.exe"116⤵
- Checks computer location settings
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\LX082.exe"C:\Users\Admin\AppData\Local\Temp\LX082.exe"117⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\YYZFM.exe"C:\Users\Admin\AppData\Local\Temp\YYZFM.exe"118⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\7L9R1.exe"C:\Users\Admin\AppData\Local\Temp\7L9R1.exe"119⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\9P9C4.exe"C:\Users\Admin\AppData\Local\Temp\9P9C4.exe"120⤵
- Checks computer location settings
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\4RBDS.exe"C:\Users\Admin\AppData\Local\Temp\4RBDS.exe"121⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\90S45.exe"C:\Users\Admin\AppData\Local\Temp\90S45.exe"122⤵PID:4872
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-