Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
6b998a418cf3482deecd87a3e10d0440d789acb5643da1a654a0711ed6a661dc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b998a418cf3482deecd87a3e10d0440d789acb5643da1a654a0711ed6a661dc.exe
Resource
win10v2004-20240426-en
General
-
Target
6b998a418cf3482deecd87a3e10d0440d789acb5643da1a654a0711ed6a661dc.exe
-
Size
1.0MB
-
MD5
37d09ef89fb36e2a06d793cde9385d5c
-
SHA1
b96d34a42ff12e511e8b523f524f9e0b1461524b
-
SHA256
6b998a418cf3482deecd87a3e10d0440d789acb5643da1a654a0711ed6a661dc
-
SHA512
7d6fb0e852c2bed60ce837070f2674bfd5986d609005746c1f5d506772ea3e4162d0524025c14f1c194b1a8dfcfcb34f42a255986a69e265c1a6943f09f73587
-
SSDEEP
24576:+qylFH52D66RwylQvtRot0h9HyrOgiruAjg:lylFHe66RlZt0jSrOm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation G8ZC6.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation EIX74.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation J72B8.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 42L9L.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 5QJHF.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation TQARI.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation HW12P.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation HJJ50.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 23D34.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Y2B62.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 72WJ9.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation FZ1EY.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation P3TTR.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation PP08O.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation I0WP5.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 5H92A.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 9Q7F5.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 93MBN.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation R4H87.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation X83O1.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 4MGYR.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation OM96X.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 251G0.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation E2594.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation VH14W.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 0H069.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Y6536.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 59276.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation PKF0G.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation K569N.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation RX446.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation M425W.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation MMZV8.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 0H688.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation HAWXD.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 4F8FQ.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation GC85Q.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 1ZH9D.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation E7V7E.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation CNX1F.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 0ND23.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation I8FO2.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 50HXG.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 80FJD.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation EBM67.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 75290.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation HFKJ0.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 9VWFS.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 8V6D2.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Q3B59.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 18Q14.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 39EO2.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation QREBG.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Q9H0R.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation C103A.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation E37L2.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 2DRG1.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation BNX28.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation M91IB.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 5U4I0.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 5383P.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation TOKL4.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 297YV.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 17Q1T.exe -
Executes dropped EXE 64 IoCs
pid Process 3996 5383P.exe 1532 H3C5X.exe 2684 TEJUU.exe 5088 98B67.exe 2516 69333.exe 3468 184FL.exe 1280 6B25E.exe 2032 306Z5.exe 1560 0632Q.exe 2884 75N25.exe 2388 728O9.exe 5104 ZR9S8.exe 2572 G8ZC6.exe 2200 K569N.exe 1792 EF67S.exe 4280 80M29.exe 1844 YN6FX.exe 1756 RX446.exe 4868 W0693.exe 1376 8D1SV.exe 2368 6193Y.exe 640 4571O.exe 1940 CR2Q5.exe 4204 58891.exe 2324 C7B60.exe 2872 4F8FQ.exe 1924 EIX74.exe 5104 67NVG.exe 2844 FR99A.exe 1988 LAV1M.exe 1792 0E225.exe 4892 440W8.exe 2836 GC85Q.exe 1640 WM7K0.exe 2396 MDBA7.exe 2444 0O6FB.exe 2516 P3TTR.exe 3720 AUQBN.exe 4432 09519.exe 3296 VRO0Q.exe 1480 EOK65.exe 2064 NT8RZ.exe 3656 87X0O.exe 248 8KR39.exe 2268 0F86K.exe 1380 H589J.exe 2844 ADOH5.exe 1072 127J5.exe 4520 Y0485.exe 4612 FZ1EY.exe 3560 058E5.exe 3548 8EX84.exe 5060 K812I.exe 1800 C8330.exe 3428 9L664.exe 1668 6037L.exe 4264 ECH0A.exe 2756 F6P66.exe 2324 SUI6Q.exe 2720 0SY1G.exe 4844 Y6536.exe 4864 S42JI.exe 1864 H6ZR0.exe 4348 69ZHS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1844 6b998a418cf3482deecd87a3e10d0440d789acb5643da1a654a0711ed6a661dc.exe 1844 6b998a418cf3482deecd87a3e10d0440d789acb5643da1a654a0711ed6a661dc.exe 3996 5383P.exe 3996 5383P.exe 1532 H3C5X.exe 1532 H3C5X.exe 2684 TEJUU.exe 2684 TEJUU.exe 5088 98B67.exe 5088 98B67.exe 2516 69333.exe 2516 69333.exe 3468 184FL.exe 3468 184FL.exe 1280 6B25E.exe 1280 6B25E.exe 2032 306Z5.exe 2032 306Z5.exe 1560 0632Q.exe 1560 0632Q.exe 2884 75N25.exe 2884 75N25.exe 2388 728O9.exe 2388 728O9.exe 5104 ZR9S8.exe 5104 ZR9S8.exe 2572 G8ZC6.exe 2572 G8ZC6.exe 2200 K569N.exe 2200 K569N.exe 1792 EF67S.exe 1792 EF67S.exe 4280 80M29.exe 4280 80M29.exe 1844 YN6FX.exe 1844 YN6FX.exe 1756 RX446.exe 1756 RX446.exe 4868 W0693.exe 4868 W0693.exe 1376 8D1SV.exe 1376 8D1SV.exe 2368 6193Y.exe 2368 6193Y.exe 640 4571O.exe 640 4571O.exe 1940 CR2Q5.exe 1940 CR2Q5.exe 4204 58891.exe 4204 58891.exe 2324 C7B60.exe 2324 C7B60.exe 2872 4F8FQ.exe 2872 4F8FQ.exe 1924 EIX74.exe 1924 EIX74.exe 5104 67NVG.exe 5104 67NVG.exe 2844 FR99A.exe 2844 FR99A.exe 1988 LAV1M.exe 1988 LAV1M.exe 1792 0E225.exe 1792 0E225.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1844 wrote to memory of 3996 1844 6b998a418cf3482deecd87a3e10d0440d789acb5643da1a654a0711ed6a661dc.exe 82 PID 1844 wrote to memory of 3996 1844 6b998a418cf3482deecd87a3e10d0440d789acb5643da1a654a0711ed6a661dc.exe 82 PID 1844 wrote to memory of 3996 1844 6b998a418cf3482deecd87a3e10d0440d789acb5643da1a654a0711ed6a661dc.exe 82 PID 3996 wrote to memory of 1532 3996 5383P.exe 83 PID 3996 wrote to memory of 1532 3996 5383P.exe 83 PID 3996 wrote to memory of 1532 3996 5383P.exe 83 PID 1532 wrote to memory of 2684 1532 H3C5X.exe 84 PID 1532 wrote to memory of 2684 1532 H3C5X.exe 84 PID 1532 wrote to memory of 2684 1532 H3C5X.exe 84 PID 2684 wrote to memory of 5088 2684 TEJUU.exe 85 PID 2684 wrote to memory of 5088 2684 TEJUU.exe 85 PID 2684 wrote to memory of 5088 2684 TEJUU.exe 85 PID 5088 wrote to memory of 2516 5088 98B67.exe 86 PID 5088 wrote to memory of 2516 5088 98B67.exe 86 PID 5088 wrote to memory of 2516 5088 98B67.exe 86 PID 2516 wrote to memory of 3468 2516 69333.exe 87 PID 2516 wrote to memory of 3468 2516 69333.exe 87 PID 2516 wrote to memory of 3468 2516 69333.exe 87 PID 3468 wrote to memory of 1280 3468 184FL.exe 88 PID 3468 wrote to memory of 1280 3468 184FL.exe 88 PID 3468 wrote to memory of 1280 3468 184FL.exe 88 PID 1280 wrote to memory of 2032 1280 6B25E.exe 91 PID 1280 wrote to memory of 2032 1280 6B25E.exe 91 PID 1280 wrote to memory of 2032 1280 6B25E.exe 91 PID 2032 wrote to memory of 1560 2032 306Z5.exe 92 PID 2032 wrote to memory of 1560 2032 306Z5.exe 92 PID 2032 wrote to memory of 1560 2032 306Z5.exe 92 PID 1560 wrote to memory of 2884 1560 0632Q.exe 95 PID 1560 wrote to memory of 2884 1560 0632Q.exe 95 PID 1560 wrote to memory of 2884 1560 0632Q.exe 95 PID 2884 wrote to memory of 2388 2884 75N25.exe 96 PID 2884 wrote to memory of 2388 2884 75N25.exe 96 PID 2884 wrote to memory of 2388 2884 75N25.exe 96 PID 2388 wrote to memory of 5104 2388 728O9.exe 97 PID 2388 wrote to memory of 5104 2388 728O9.exe 97 PID 2388 wrote to memory of 5104 2388 728O9.exe 97 PID 5104 wrote to memory of 2572 5104 ZR9S8.exe 98 PID 5104 wrote to memory of 2572 5104 ZR9S8.exe 98 PID 5104 wrote to memory of 2572 5104 ZR9S8.exe 98 PID 2572 wrote to memory of 2200 2572 G8ZC6.exe 99 PID 2572 wrote to memory of 2200 2572 G8ZC6.exe 99 PID 2572 wrote to memory of 2200 2572 G8ZC6.exe 99 PID 2200 wrote to memory of 1792 2200 K569N.exe 101 PID 2200 wrote to memory of 1792 2200 K569N.exe 101 PID 2200 wrote to memory of 1792 2200 K569N.exe 101 PID 1792 wrote to memory of 4280 1792 EF67S.exe 102 PID 1792 wrote to memory of 4280 1792 EF67S.exe 102 PID 1792 wrote to memory of 4280 1792 EF67S.exe 102 PID 4280 wrote to memory of 1844 4280 80M29.exe 103 PID 4280 wrote to memory of 1844 4280 80M29.exe 103 PID 4280 wrote to memory of 1844 4280 80M29.exe 103 PID 1844 wrote to memory of 1756 1844 YN6FX.exe 104 PID 1844 wrote to memory of 1756 1844 YN6FX.exe 104 PID 1844 wrote to memory of 1756 1844 YN6FX.exe 104 PID 1756 wrote to memory of 4868 1756 RX446.exe 105 PID 1756 wrote to memory of 4868 1756 RX446.exe 105 PID 1756 wrote to memory of 4868 1756 RX446.exe 105 PID 4868 wrote to memory of 1376 4868 W0693.exe 106 PID 4868 wrote to memory of 1376 4868 W0693.exe 106 PID 4868 wrote to memory of 1376 4868 W0693.exe 106 PID 1376 wrote to memory of 2368 1376 8D1SV.exe 107 PID 1376 wrote to memory of 2368 1376 8D1SV.exe 107 PID 1376 wrote to memory of 2368 1376 8D1SV.exe 107 PID 2368 wrote to memory of 640 2368 6193Y.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b998a418cf3482deecd87a3e10d0440d789acb5643da1a654a0711ed6a661dc.exe"C:\Users\Admin\AppData\Local\Temp\6b998a418cf3482deecd87a3e10d0440d789acb5643da1a654a0711ed6a661dc.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\5383P.exe"C:\Users\Admin\AppData\Local\Temp\5383P.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\H3C5X.exe"C:\Users\Admin\AppData\Local\Temp\H3C5X.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\TEJUU.exe"C:\Users\Admin\AppData\Local\Temp\TEJUU.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\98B67.exe"C:\Users\Admin\AppData\Local\Temp\98B67.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\69333.exe"C:\Users\Admin\AppData\Local\Temp\69333.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\184FL.exe"C:\Users\Admin\AppData\Local\Temp\184FL.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\6B25E.exe"C:\Users\Admin\AppData\Local\Temp\6B25E.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\306Z5.exe"C:\Users\Admin\AppData\Local\Temp\306Z5.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\0632Q.exe"C:\Users\Admin\AppData\Local\Temp\0632Q.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\75N25.exe"C:\Users\Admin\AppData\Local\Temp\75N25.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\728O9.exe"C:\Users\Admin\AppData\Local\Temp\728O9.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\ZR9S8.exe"C:\Users\Admin\AppData\Local\Temp\ZR9S8.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\G8ZC6.exe"C:\Users\Admin\AppData\Local\Temp\G8ZC6.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\K569N.exe"C:\Users\Admin\AppData\Local\Temp\K569N.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\EF67S.exe"C:\Users\Admin\AppData\Local\Temp\EF67S.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\80M29.exe"C:\Users\Admin\AppData\Local\Temp\80M29.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\YN6FX.exe"C:\Users\Admin\AppData\Local\Temp\YN6FX.exe"18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\RX446.exe"C:\Users\Admin\AppData\Local\Temp\RX446.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\W0693.exe"C:\Users\Admin\AppData\Local\Temp\W0693.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\8D1SV.exe"C:\Users\Admin\AppData\Local\Temp\8D1SV.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\6193Y.exe"C:\Users\Admin\AppData\Local\Temp\6193Y.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\4571O.exe"C:\Users\Admin\AppData\Local\Temp\4571O.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:640 -
C:\Users\Admin\AppData\Local\Temp\CR2Q5.exe"C:\Users\Admin\AppData\Local\Temp\CR2Q5.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\58891.exe"C:\Users\Admin\AppData\Local\Temp\58891.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\C7B60.exe"C:\Users\Admin\AppData\Local\Temp\C7B60.exe"26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\4F8FQ.exe"C:\Users\Admin\AppData\Local\Temp\4F8FQ.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\EIX74.exe"C:\Users\Admin\AppData\Local\Temp\EIX74.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\67NVG.exe"C:\Users\Admin\AppData\Local\Temp\67NVG.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\FR99A.exe"C:\Users\Admin\AppData\Local\Temp\FR99A.exe"30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\LAV1M.exe"C:\Users\Admin\AppData\Local\Temp\LAV1M.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\0E225.exe"C:\Users\Admin\AppData\Local\Temp\0E225.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\440W8.exe"C:\Users\Admin\AppData\Local\Temp\440W8.exe"33⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\GC85Q.exe"C:\Users\Admin\AppData\Local\Temp\GC85Q.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\WM7K0.exe"C:\Users\Admin\AppData\Local\Temp\WM7K0.exe"35⤵
- Executes dropped EXE
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\MDBA7.exe"C:\Users\Admin\AppData\Local\Temp\MDBA7.exe"36⤵
- Executes dropped EXE
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\0O6FB.exe"C:\Users\Admin\AppData\Local\Temp\0O6FB.exe"37⤵
- Executes dropped EXE
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\P3TTR.exe"C:\Users\Admin\AppData\Local\Temp\P3TTR.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\AUQBN.exe"C:\Users\Admin\AppData\Local\Temp\AUQBN.exe"39⤵
- Executes dropped EXE
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\09519.exe"C:\Users\Admin\AppData\Local\Temp\09519.exe"40⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\VRO0Q.exe"C:\Users\Admin\AppData\Local\Temp\VRO0Q.exe"41⤵
- Executes dropped EXE
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\EOK65.exe"C:\Users\Admin\AppData\Local\Temp\EOK65.exe"42⤵
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\NT8RZ.exe"C:\Users\Admin\AppData\Local\Temp\NT8RZ.exe"43⤵
- Executes dropped EXE
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\87X0O.exe"C:\Users\Admin\AppData\Local\Temp\87X0O.exe"44⤵
- Executes dropped EXE
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\8KR39.exe"C:\Users\Admin\AppData\Local\Temp\8KR39.exe"45⤵
- Executes dropped EXE
PID:248 -
C:\Users\Admin\AppData\Local\Temp\0F86K.exe"C:\Users\Admin\AppData\Local\Temp\0F86K.exe"46⤵
- Executes dropped EXE
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\H589J.exe"C:\Users\Admin\AppData\Local\Temp\H589J.exe"47⤵
- Executes dropped EXE
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\ADOH5.exe"C:\Users\Admin\AppData\Local\Temp\ADOH5.exe"48⤵
- Executes dropped EXE
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\127J5.exe"C:\Users\Admin\AppData\Local\Temp\127J5.exe"49⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Y0485.exe"C:\Users\Admin\AppData\Local\Temp\Y0485.exe"50⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\FZ1EY.exe"C:\Users\Admin\AppData\Local\Temp\FZ1EY.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\058E5.exe"C:\Users\Admin\AppData\Local\Temp\058E5.exe"52⤵
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\8EX84.exe"C:\Users\Admin\AppData\Local\Temp\8EX84.exe"53⤵
- Executes dropped EXE
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\K812I.exe"C:\Users\Admin\AppData\Local\Temp\K812I.exe"54⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\C8330.exe"C:\Users\Admin\AppData\Local\Temp\C8330.exe"55⤵
- Executes dropped EXE
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\9L664.exe"C:\Users\Admin\AppData\Local\Temp\9L664.exe"56⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\6037L.exe"C:\Users\Admin\AppData\Local\Temp\6037L.exe"57⤵
- Executes dropped EXE
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\ECH0A.exe"C:\Users\Admin\AppData\Local\Temp\ECH0A.exe"58⤵
- Executes dropped EXE
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\F6P66.exe"C:\Users\Admin\AppData\Local\Temp\F6P66.exe"59⤵
- Executes dropped EXE
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\SUI6Q.exe"C:\Users\Admin\AppData\Local\Temp\SUI6Q.exe"60⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\0SY1G.exe"C:\Users\Admin\AppData\Local\Temp\0SY1G.exe"61⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Y6536.exe"C:\Users\Admin\AppData\Local\Temp\Y6536.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\S42JI.exe"C:\Users\Admin\AppData\Local\Temp\S42JI.exe"63⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\H6ZR0.exe"C:\Users\Admin\AppData\Local\Temp\H6ZR0.exe"64⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\69ZHS.exe"C:\Users\Admin\AppData\Local\Temp\69ZHS.exe"65⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\R4H87.exe"C:\Users\Admin\AppData\Local\Temp\R4H87.exe"66⤵
- Checks computer location settings
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\U7R29.exe"C:\Users\Admin\AppData\Local\Temp\U7R29.exe"67⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\5KT3S.exe"C:\Users\Admin\AppData\Local\Temp\5KT3S.exe"68⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\14573.exe"C:\Users\Admin\AppData\Local\Temp\14573.exe"69⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\9UPT3.exe"C:\Users\Admin\AppData\Local\Temp\9UPT3.exe"70⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\9NJ0E.exe"C:\Users\Admin\AppData\Local\Temp\9NJ0E.exe"71⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\TOKL4.exe"C:\Users\Admin\AppData\Local\Temp\TOKL4.exe"72⤵
- Checks computer location settings
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\8FK8C.exe"C:\Users\Admin\AppData\Local\Temp\8FK8C.exe"73⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\U0A1K.exe"C:\Users\Admin\AppData\Local\Temp\U0A1K.exe"74⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\O8CPC.exe"C:\Users\Admin\AppData\Local\Temp\O8CPC.exe"75⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\7Y107.exe"C:\Users\Admin\AppData\Local\Temp\7Y107.exe"76⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\S6N25.exe"C:\Users\Admin\AppData\Local\Temp\S6N25.exe"77⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\5WA40.exe"C:\Users\Admin\AppData\Local\Temp\5WA40.exe"78⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\L3MXG.exe"C:\Users\Admin\AppData\Local\Temp\L3MXG.exe"79⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\GGWCH.exe"C:\Users\Admin\AppData\Local\Temp\GGWCH.exe"80⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\D91U0.exe"C:\Users\Admin\AppData\Local\Temp\D91U0.exe"81⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\0LDE7.exe"C:\Users\Admin\AppData\Local\Temp\0LDE7.exe"82⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\92O3F.exe"C:\Users\Admin\AppData\Local\Temp\92O3F.exe"83⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\R37XP.exe"C:\Users\Admin\AppData\Local\Temp\R37XP.exe"84⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\8CQ74.exe"C:\Users\Admin\AppData\Local\Temp\8CQ74.exe"85⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\7E01O.exe"C:\Users\Admin\AppData\Local\Temp\7E01O.exe"86⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\23D34.exe"C:\Users\Admin\AppData\Local\Temp\23D34.exe"87⤵
- Checks computer location settings
PID:864 -
C:\Users\Admin\AppData\Local\Temp\Y2B62.exe"C:\Users\Admin\AppData\Local\Temp\Y2B62.exe"88⤵
- Checks computer location settings
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\OM96X.exe"C:\Users\Admin\AppData\Local\Temp\OM96X.exe"89⤵
- Checks computer location settings
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\16L1M.exe"C:\Users\Admin\AppData\Local\Temp\16L1M.exe"90⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\RJ1W7.exe"C:\Users\Admin\AppData\Local\Temp\RJ1W7.exe"91⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\3ZKP8.exe"C:\Users\Admin\AppData\Local\Temp\3ZKP8.exe"92⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\T11HY.exe"C:\Users\Admin\AppData\Local\Temp\T11HY.exe"93⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\LPMRI.exe"C:\Users\Admin\AppData\Local\Temp\LPMRI.exe"94⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\346B2.exe"C:\Users\Admin\AppData\Local\Temp\346B2.exe"95⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\5O7K2.exe"C:\Users\Admin\AppData\Local\Temp\5O7K2.exe"96⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\E0E3O.exe"C:\Users\Admin\AppData\Local\Temp\E0E3O.exe"97⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\387W2.exe"C:\Users\Admin\AppData\Local\Temp\387W2.exe"98⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\2CO81.exe"C:\Users\Admin\AppData\Local\Temp\2CO81.exe"99⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\WK93C.exe"C:\Users\Admin\AppData\Local\Temp\WK93C.exe"100⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\FGL8Q.exe"C:\Users\Admin\AppData\Local\Temp\FGL8Q.exe"101⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\1TFP0.exe"C:\Users\Admin\AppData\Local\Temp\1TFP0.exe"102⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\872OX.exe"C:\Users\Admin\AppData\Local\Temp\872OX.exe"103⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\0BP53.exe"C:\Users\Admin\AppData\Local\Temp\0BP53.exe"104⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\2Z2K0.exe"C:\Users\Admin\AppData\Local\Temp\2Z2K0.exe"105⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\8518D.exe"C:\Users\Admin\AppData\Local\Temp\8518D.exe"106⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\TQH2Y.exe"C:\Users\Admin\AppData\Local\Temp\TQH2Y.exe"107⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\F1M11.exe"C:\Users\Admin\AppData\Local\Temp\F1M11.exe"108⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\XVG61.exe"C:\Users\Admin\AppData\Local\Temp\XVG61.exe"109⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\N856E.exe"C:\Users\Admin\AppData\Local\Temp\N856E.exe"110⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\17Q1T.exe"C:\Users\Admin\AppData\Local\Temp\17Q1T.exe"111⤵
- Checks computer location settings
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\9V8A3.exe"C:\Users\Admin\AppData\Local\Temp\9V8A3.exe"112⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\ZO94F.exe"C:\Users\Admin\AppData\Local\Temp\ZO94F.exe"113⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\I2Y62.exe"C:\Users\Admin\AppData\Local\Temp\I2Y62.exe"114⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\882U4.exe"C:\Users\Admin\AppData\Local\Temp\882U4.exe"115⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\HL3NB.exe"C:\Users\Admin\AppData\Local\Temp\HL3NB.exe"116⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\N82XQ.exe"C:\Users\Admin\AppData\Local\Temp\N82XQ.exe"117⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\4KXH5.exe"C:\Users\Admin\AppData\Local\Temp\4KXH5.exe"118⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\7DZY5.exe"C:\Users\Admin\AppData\Local\Temp\7DZY5.exe"119⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\Q9H0R.exe"C:\Users\Admin\AppData\Local\Temp\Q9H0R.exe"120⤵
- Checks computer location settings
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\8HXTZ.exe"C:\Users\Admin\AppData\Local\Temp\8HXTZ.exe"121⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\TWN41.exe"C:\Users\Admin\AppData\Local\Temp\TWN41.exe"122⤵PID:3152
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-