Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
27f7068feee963bdfb6156567d658943326bd01530fcae63261bcb19604a4ebf.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
27f7068feee963bdfb6156567d658943326bd01530fcae63261bcb19604a4ebf.exe
Resource
win10v2004-20240226-en
General
-
Target
27f7068feee963bdfb6156567d658943326bd01530fcae63261bcb19604a4ebf.exe
-
Size
1.0MB
-
MD5
d6f6bf0339290d68aa01426923542e9d
-
SHA1
447406980fe1d469ecf88388761c3b5459e08104
-
SHA256
27f7068feee963bdfb6156567d658943326bd01530fcae63261bcb19604a4ebf
-
SHA512
c0a3c613e8630a3d127e4280da8c05558ea87449a09d4d0e6a1f516171de461ce062d82a8ad57caceb57d7218e1c08ab7eeb10adc3d2b58dedb75b0e5db168dd
-
SSDEEP
24576:FqOMFH5BhM6RwleQktOot0h9HyrOOfGOAn:4OMFHa6meHt0jSrO7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2QZ66.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 6B5Q1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation E8B52.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 7316R.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation LO226.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation D7C9F.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 8NHP3.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 5G346.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation S62I6.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 30WOD.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 7NG79.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Q826S.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation UV1PY.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 4W4BN.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation TA732.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation SB136.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 36J1T.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 8HXTZ.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation J4X23.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation KORK1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation B7844.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation M55KM.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 50VTM.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 6121Z.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation F4G8L.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation B3C40.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation TPDK3.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation D4H50.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation G7GG3.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 6T5SV.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation X47ZK.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 25DXO.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 67ANT.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 1H513.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 53FE0.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation LI2CA.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 3775G.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation HWG17.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Q2C26.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation HRO84.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation F0R11.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation PZQBY.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation U57SP.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 9L191.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation PPC6S.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 97GKN.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 0291C.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation SWVSS.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation PB95W.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2YXQ6.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation L21S2.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 9DUQ3.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation D3857.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation VQ2ZS.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation X5UVY.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation S7V9M.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 0N1DT.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 7Q2MY.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation K3TIO.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 856IZ.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 5T05N.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation UJ722.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 52C43.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation OOV89.exe -
Executes dropped EXE 64 IoCs
pid Process 1220 4R4EB.exe 2616 0N1DT.exe 3840 M8Q74.exe 1124 7Q2MY.exe 4604 PB95W.exe 3488 2YXQ6.exe 3576 3VB57.exe 1772 4RI9E.exe 208 HWG17.exe 3308 UV1PY.exe 5080 17471.exe 2464 B3C40.exe 1380 053J0.exe 3956 QHCYJ.exe 3036 83E54.exe 1464 67ANT.exe 3992 7316R.exe 1332 OEAO7.exe 2688 8HXTZ.exe 4864 154GL.exe 4424 K3TIO.exe 3284 J4X23.exe 3824 Q2C26.exe 3880 1H513.exe 3848 4W4BN.exe 1144 JQZ9Y.exe 524 KORK1.exe 2804 U57SP.exe 4608 8R1KI.exe 2688 271PP.exe 1972 1M8O2.exe 4384 S64YQ.exe 1016 M2349.exe 4632 52C43.exe 1800 CI737.exe 1248 LO226.exe 3812 07ZWG.exe 1652 OOV89.exe 3128 YYZFM.exe 1060 856IZ.exe 2232 QA8B1.exe 1496 51W1N.exe 3008 B7844.exe 2056 WE6S2.exe 3468 VFH56.exe 1480 TA732.exe 3984 5T05N.exe 2328 VQ2ZS.exe 2120 NT960.exe 3424 0291C.exe 2516 P6H71.exe 4996 DRY32.exe 1060 62Q54.exe 4980 TPDK3.exe 4416 SB136.exe 1940 7373N.exe 2056 ZWRAQ.exe 1344 2Q5WK.exe 4504 53FE0.exe 3956 0QXJ5.exe 1956 D4H50.exe 2120 85O65.exe 212 GC0ZV.exe 3604 BA7Q8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1380 27f7068feee963bdfb6156567d658943326bd01530fcae63261bcb19604a4ebf.exe 1380 27f7068feee963bdfb6156567d658943326bd01530fcae63261bcb19604a4ebf.exe 1220 4R4EB.exe 1220 4R4EB.exe 2616 0N1DT.exe 2616 0N1DT.exe 3840 M8Q74.exe 3840 M8Q74.exe 1124 7Q2MY.exe 1124 7Q2MY.exe 4604 PB95W.exe 4604 PB95W.exe 3488 2YXQ6.exe 3488 2YXQ6.exe 3576 3VB57.exe 3576 3VB57.exe 1772 4RI9E.exe 1772 4RI9E.exe 208 HWG17.exe 208 HWG17.exe 3308 UV1PY.exe 3308 UV1PY.exe 5080 17471.exe 5080 17471.exe 2464 B3C40.exe 2464 B3C40.exe 1380 053J0.exe 1380 053J0.exe 3956 QHCYJ.exe 3956 QHCYJ.exe 3036 83E54.exe 3036 83E54.exe 1464 67ANT.exe 1464 67ANT.exe 3992 7316R.exe 3992 7316R.exe 1332 OEAO7.exe 1332 OEAO7.exe 2688 8HXTZ.exe 2688 8HXTZ.exe 4864 154GL.exe 4864 154GL.exe 4424 K3TIO.exe 4424 K3TIO.exe 3284 J4X23.exe 3284 J4X23.exe 3824 Q2C26.exe 3824 Q2C26.exe 3880 1H513.exe 3880 1H513.exe 3848 4W4BN.exe 3848 4W4BN.exe 1144 JQZ9Y.exe 1144 JQZ9Y.exe 524 KORK1.exe 524 KORK1.exe 2804 U57SP.exe 2804 U57SP.exe 4608 8R1KI.exe 4608 8R1KI.exe 2688 271PP.exe 2688 271PP.exe 1972 1M8O2.exe 1972 1M8O2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1220 1380 27f7068feee963bdfb6156567d658943326bd01530fcae63261bcb19604a4ebf.exe 91 PID 1380 wrote to memory of 1220 1380 27f7068feee963bdfb6156567d658943326bd01530fcae63261bcb19604a4ebf.exe 91 PID 1380 wrote to memory of 1220 1380 27f7068feee963bdfb6156567d658943326bd01530fcae63261bcb19604a4ebf.exe 91 PID 1220 wrote to memory of 2616 1220 4R4EB.exe 92 PID 1220 wrote to memory of 2616 1220 4R4EB.exe 92 PID 1220 wrote to memory of 2616 1220 4R4EB.exe 92 PID 2616 wrote to memory of 3840 2616 0N1DT.exe 93 PID 2616 wrote to memory of 3840 2616 0N1DT.exe 93 PID 2616 wrote to memory of 3840 2616 0N1DT.exe 93 PID 3840 wrote to memory of 1124 3840 M8Q74.exe 94 PID 3840 wrote to memory of 1124 3840 M8Q74.exe 94 PID 3840 wrote to memory of 1124 3840 M8Q74.exe 94 PID 1124 wrote to memory of 4604 1124 7Q2MY.exe 95 PID 1124 wrote to memory of 4604 1124 7Q2MY.exe 95 PID 1124 wrote to memory of 4604 1124 7Q2MY.exe 95 PID 4604 wrote to memory of 3488 4604 PB95W.exe 96 PID 4604 wrote to memory of 3488 4604 PB95W.exe 96 PID 4604 wrote to memory of 3488 4604 PB95W.exe 96 PID 3488 wrote to memory of 3576 3488 2YXQ6.exe 97 PID 3488 wrote to memory of 3576 3488 2YXQ6.exe 97 PID 3488 wrote to memory of 3576 3488 2YXQ6.exe 97 PID 3576 wrote to memory of 1772 3576 3VB57.exe 98 PID 3576 wrote to memory of 1772 3576 3VB57.exe 98 PID 3576 wrote to memory of 1772 3576 3VB57.exe 98 PID 1772 wrote to memory of 208 1772 4RI9E.exe 101 PID 1772 wrote to memory of 208 1772 4RI9E.exe 101 PID 1772 wrote to memory of 208 1772 4RI9E.exe 101 PID 208 wrote to memory of 3308 208 HWG17.exe 102 PID 208 wrote to memory of 3308 208 HWG17.exe 102 PID 208 wrote to memory of 3308 208 HWG17.exe 102 PID 3308 wrote to memory of 5080 3308 UV1PY.exe 104 PID 3308 wrote to memory of 5080 3308 UV1PY.exe 104 PID 3308 wrote to memory of 5080 3308 UV1PY.exe 104 PID 5080 wrote to memory of 2464 5080 17471.exe 106 PID 5080 wrote to memory of 2464 5080 17471.exe 106 PID 5080 wrote to memory of 2464 5080 17471.exe 106 PID 2464 wrote to memory of 1380 2464 B3C40.exe 107 PID 2464 wrote to memory of 1380 2464 B3C40.exe 107 PID 2464 wrote to memory of 1380 2464 B3C40.exe 107 PID 1380 wrote to memory of 3956 1380 053J0.exe 108 PID 1380 wrote to memory of 3956 1380 053J0.exe 108 PID 1380 wrote to memory of 3956 1380 053J0.exe 108 PID 3956 wrote to memory of 3036 3956 QHCYJ.exe 110 PID 3956 wrote to memory of 3036 3956 QHCYJ.exe 110 PID 3956 wrote to memory of 3036 3956 QHCYJ.exe 110 PID 3036 wrote to memory of 1464 3036 83E54.exe 111 PID 3036 wrote to memory of 1464 3036 83E54.exe 111 PID 3036 wrote to memory of 1464 3036 83E54.exe 111 PID 1464 wrote to memory of 3992 1464 67ANT.exe 112 PID 1464 wrote to memory of 3992 1464 67ANT.exe 112 PID 1464 wrote to memory of 3992 1464 67ANT.exe 112 PID 3992 wrote to memory of 1332 3992 7316R.exe 114 PID 3992 wrote to memory of 1332 3992 7316R.exe 114 PID 3992 wrote to memory of 1332 3992 7316R.exe 114 PID 1332 wrote to memory of 2688 1332 OEAO7.exe 128 PID 1332 wrote to memory of 2688 1332 OEAO7.exe 128 PID 1332 wrote to memory of 2688 1332 OEAO7.exe 128 PID 2688 wrote to memory of 4864 2688 8HXTZ.exe 117 PID 2688 wrote to memory of 4864 2688 8HXTZ.exe 117 PID 2688 wrote to memory of 4864 2688 8HXTZ.exe 117 PID 4864 wrote to memory of 4424 4864 154GL.exe 118 PID 4864 wrote to memory of 4424 4864 154GL.exe 118 PID 4864 wrote to memory of 4424 4864 154GL.exe 118 PID 4424 wrote to memory of 3284 4424 K3TIO.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\27f7068feee963bdfb6156567d658943326bd01530fcae63261bcb19604a4ebf.exe"C:\Users\Admin\AppData\Local\Temp\27f7068feee963bdfb6156567d658943326bd01530fcae63261bcb19604a4ebf.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\4R4EB.exe"C:\Users\Admin\AppData\Local\Temp\4R4EB.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\0N1DT.exe"C:\Users\Admin\AppData\Local\Temp\0N1DT.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\M8Q74.exe"C:\Users\Admin\AppData\Local\Temp\M8Q74.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\7Q2MY.exe"C:\Users\Admin\AppData\Local\Temp\7Q2MY.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\PB95W.exe"C:\Users\Admin\AppData\Local\Temp\PB95W.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\2YXQ6.exe"C:\Users\Admin\AppData\Local\Temp\2YXQ6.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\3VB57.exe"C:\Users\Admin\AppData\Local\Temp\3VB57.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\4RI9E.exe"C:\Users\Admin\AppData\Local\Temp\4RI9E.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\HWG17.exe"C:\Users\Admin\AppData\Local\Temp\HWG17.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\UV1PY.exe"C:\Users\Admin\AppData\Local\Temp\UV1PY.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\17471.exe"C:\Users\Admin\AppData\Local\Temp\17471.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\B3C40.exe"C:\Users\Admin\AppData\Local\Temp\B3C40.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\053J0.exe"C:\Users\Admin\AppData\Local\Temp\053J0.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\QHCYJ.exe"C:\Users\Admin\AppData\Local\Temp\QHCYJ.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\83E54.exe"C:\Users\Admin\AppData\Local\Temp\83E54.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\67ANT.exe"C:\Users\Admin\AppData\Local\Temp\67ANT.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\7316R.exe"C:\Users\Admin\AppData\Local\Temp\7316R.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\OEAO7.exe"C:\Users\Admin\AppData\Local\Temp\OEAO7.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\8HXTZ.exe"C:\Users\Admin\AppData\Local\Temp\8HXTZ.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\154GL.exe"C:\Users\Admin\AppData\Local\Temp\154GL.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\K3TIO.exe"C:\Users\Admin\AppData\Local\Temp\K3TIO.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\J4X23.exe"C:\Users\Admin\AppData\Local\Temp\J4X23.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\Q2C26.exe"C:\Users\Admin\AppData\Local\Temp\Q2C26.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\1H513.exe"C:\Users\Admin\AppData\Local\Temp\1H513.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\4W4BN.exe"C:\Users\Admin\AppData\Local\Temp\4W4BN.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\JQZ9Y.exe"C:\Users\Admin\AppData\Local\Temp\JQZ9Y.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\KORK1.exe"C:\Users\Admin\AppData\Local\Temp\KORK1.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:524 -
C:\Users\Admin\AppData\Local\Temp\U57SP.exe"C:\Users\Admin\AppData\Local\Temp\U57SP.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\8R1KI.exe"C:\Users\Admin\AppData\Local\Temp\8R1KI.exe"30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\271PP.exe"C:\Users\Admin\AppData\Local\Temp\271PP.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\1M8O2.exe"C:\Users\Admin\AppData\Local\Temp\1M8O2.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\S64YQ.exe"C:\Users\Admin\AppData\Local\Temp\S64YQ.exe"33⤵
- Executes dropped EXE
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\M2349.exe"C:\Users\Admin\AppData\Local\Temp\M2349.exe"34⤵
- Executes dropped EXE
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\52C43.exe"C:\Users\Admin\AppData\Local\Temp\52C43.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\CI737.exe"C:\Users\Admin\AppData\Local\Temp\CI737.exe"36⤵
- Executes dropped EXE
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\LO226.exe"C:\Users\Admin\AppData\Local\Temp\LO226.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\07ZWG.exe"C:\Users\Admin\AppData\Local\Temp\07ZWG.exe"38⤵
- Executes dropped EXE
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\OOV89.exe"C:\Users\Admin\AppData\Local\Temp\OOV89.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\YYZFM.exe"C:\Users\Admin\AppData\Local\Temp\YYZFM.exe"40⤵
- Executes dropped EXE
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\856IZ.exe"C:\Users\Admin\AppData\Local\Temp\856IZ.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\QA8B1.exe"C:\Users\Admin\AppData\Local\Temp\QA8B1.exe"42⤵
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\51W1N.exe"C:\Users\Admin\AppData\Local\Temp\51W1N.exe"43⤵
- Executes dropped EXE
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\B7844.exe"C:\Users\Admin\AppData\Local\Temp\B7844.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\WE6S2.exe"C:\Users\Admin\AppData\Local\Temp\WE6S2.exe"45⤵
- Executes dropped EXE
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\VFH56.exe"C:\Users\Admin\AppData\Local\Temp\VFH56.exe"46⤵
- Executes dropped EXE
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\TA732.exe"C:\Users\Admin\AppData\Local\Temp\TA732.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\5T05N.exe"C:\Users\Admin\AppData\Local\Temp\5T05N.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\VQ2ZS.exe"C:\Users\Admin\AppData\Local\Temp\VQ2ZS.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\NT960.exe"C:\Users\Admin\AppData\Local\Temp\NT960.exe"50⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\0291C.exe"C:\Users\Admin\AppData\Local\Temp\0291C.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\P6H71.exe"C:\Users\Admin\AppData\Local\Temp\P6H71.exe"52⤵
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\DRY32.exe"C:\Users\Admin\AppData\Local\Temp\DRY32.exe"53⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\62Q54.exe"C:\Users\Admin\AppData\Local\Temp\62Q54.exe"54⤵
- Executes dropped EXE
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\TPDK3.exe"C:\Users\Admin\AppData\Local\Temp\TPDK3.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\SB136.exe"C:\Users\Admin\AppData\Local\Temp\SB136.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\7373N.exe"C:\Users\Admin\AppData\Local\Temp\7373N.exe"57⤵
- Executes dropped EXE
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\ZWRAQ.exe"C:\Users\Admin\AppData\Local\Temp\ZWRAQ.exe"58⤵
- Executes dropped EXE
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\2Q5WK.exe"C:\Users\Admin\AppData\Local\Temp\2Q5WK.exe"59⤵
- Executes dropped EXE
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\53FE0.exe"C:\Users\Admin\AppData\Local\Temp\53FE0.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\0QXJ5.exe"C:\Users\Admin\AppData\Local\Temp\0QXJ5.exe"61⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\D4H50.exe"C:\Users\Admin\AppData\Local\Temp\D4H50.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\85O65.exe"C:\Users\Admin\AppData\Local\Temp\85O65.exe"63⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\GC0ZV.exe"C:\Users\Admin\AppData\Local\Temp\GC0ZV.exe"64⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\BA7Q8.exe"C:\Users\Admin\AppData\Local\Temp\BA7Q8.exe"65⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\D7C9F.exe"C:\Users\Admin\AppData\Local\Temp\D7C9F.exe"66⤵
- Checks computer location settings
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\L21S2.exe"C:\Users\Admin\AppData\Local\Temp\L21S2.exe"67⤵
- Checks computer location settings
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\8NHP3.exe"C:\Users\Admin\AppData\Local\Temp\8NHP3.exe"68⤵
- Checks computer location settings
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\6T5SV.exe"C:\Users\Admin\AppData\Local\Temp\6T5SV.exe"69⤵
- Checks computer location settings
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\50VTM.exe"C:\Users\Admin\AppData\Local\Temp\50VTM.exe"70⤵
- Checks computer location settings
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\095W8.exe"C:\Users\Admin\AppData\Local\Temp\095W8.exe"71⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\G7GG3.exe"C:\Users\Admin\AppData\Local\Temp\G7GG3.exe"72⤵
- Checks computer location settings
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\69YIQ.exe"C:\Users\Admin\AppData\Local\Temp\69YIQ.exe"73⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\44E8S.exe"C:\Users\Admin\AppData\Local\Temp\44E8S.exe"74⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\K8P1S.exe"C:\Users\Admin\AppData\Local\Temp\K8P1S.exe"75⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\5G346.exe"C:\Users\Admin\AppData\Local\Temp\5G346.exe"76⤵
- Checks computer location settings
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\21764.exe"C:\Users\Admin\AppData\Local\Temp\21764.exe"77⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\E8B52.exe"C:\Users\Admin\AppData\Local\Temp\E8B52.exe"78⤵
- Checks computer location settings
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\36J1T.exe"C:\Users\Admin\AppData\Local\Temp\36J1T.exe"79⤵
- Checks computer location settings
PID:464 -
C:\Users\Admin\AppData\Local\Temp\S62I6.exe"C:\Users\Admin\AppData\Local\Temp\S62I6.exe"80⤵
- Checks computer location settings
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\M55KM.exe"C:\Users\Admin\AppData\Local\Temp\M55KM.exe"81⤵
- Checks computer location settings
PID:452 -
C:\Users\Admin\AppData\Local\Temp\WRJ33.exe"C:\Users\Admin\AppData\Local\Temp\WRJ33.exe"82⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\FX7DG.exe"C:\Users\Admin\AppData\Local\Temp\FX7DG.exe"83⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\227QN.exe"C:\Users\Admin\AppData\Local\Temp\227QN.exe"84⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\MJ04U.exe"C:\Users\Admin\AppData\Local\Temp\MJ04U.exe"85⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\9DUQ3.exe"C:\Users\Admin\AppData\Local\Temp\9DUQ3.exe"86⤵
- Checks computer location settings
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\9L3G0.exe"C:\Users\Admin\AppData\Local\Temp\9L3G0.exe"87⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\X47ZK.exe"C:\Users\Admin\AppData\Local\Temp\X47ZK.exe"88⤵
- Checks computer location settings
PID:224 -
C:\Users\Admin\AppData\Local\Temp\II7ES.exe"C:\Users\Admin\AppData\Local\Temp\II7ES.exe"89⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\702FO.exe"C:\Users\Admin\AppData\Local\Temp\702FO.exe"90⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\V2DEY.exe"C:\Users\Admin\AppData\Local\Temp\V2DEY.exe"91⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\1F0NR.exe"C:\Users\Admin\AppData\Local\Temp\1F0NR.exe"92⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\2QZ66.exe"C:\Users\Admin\AppData\Local\Temp\2QZ66.exe"93⤵
- Checks computer location settings
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\O6AK8.exe"C:\Users\Admin\AppData\Local\Temp\O6AK8.exe"94⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\LI2CA.exe"C:\Users\Admin\AppData\Local\Temp\LI2CA.exe"95⤵
- Checks computer location settings
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\F8Q0Z.exe"C:\Users\Admin\AppData\Local\Temp\F8Q0Z.exe"96⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\0RBD8.exe"C:\Users\Admin\AppData\Local\Temp\0RBD8.exe"97⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\R3AXM.exe"C:\Users\Admin\AppData\Local\Temp\R3AXM.exe"98⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\9L191.exe"C:\Users\Admin\AppData\Local\Temp\9L191.exe"99⤵
- Checks computer location settings
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\PPC6S.exe"C:\Users\Admin\AppData\Local\Temp\PPC6S.exe"100⤵
- Checks computer location settings
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\SWVSS.exe"C:\Users\Admin\AppData\Local\Temp\SWVSS.exe"101⤵
- Checks computer location settings
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\1MACM.exe"C:\Users\Admin\AppData\Local\Temp\1MACM.exe"102⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\25DXO.exe"C:\Users\Admin\AppData\Local\Temp\25DXO.exe"103⤵
- Checks computer location settings
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\I56M1.exe"C:\Users\Admin\AppData\Local\Temp\I56M1.exe"104⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\7YJW5.exe"C:\Users\Admin\AppData\Local\Temp\7YJW5.exe"105⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\E2K8M.exe"C:\Users\Admin\AppData\Local\Temp\E2K8M.exe"106⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\50I5H.exe"C:\Users\Admin\AppData\Local\Temp\50I5H.exe"107⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\I0USA.exe"C:\Users\Admin\AppData\Local\Temp\I0USA.exe"108⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\A6925.exe"C:\Users\Admin\AppData\Local\Temp\A6925.exe"109⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\7NG79.exe"C:\Users\Admin\AppData\Local\Temp\7NG79.exe"110⤵
- Checks computer location settings
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\UAKRZ.exe"C:\Users\Admin\AppData\Local\Temp\UAKRZ.exe"111⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\X5UVY.exe"C:\Users\Admin\AppData\Local\Temp\X5UVY.exe"112⤵
- Checks computer location settings
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\5CY9Z.exe"C:\Users\Admin\AppData\Local\Temp\5CY9Z.exe"113⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\905O4.exe"C:\Users\Admin\AppData\Local\Temp\905O4.exe"114⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\87RKE.exe"C:\Users\Admin\AppData\Local\Temp\87RKE.exe"115⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\G41D1.exe"C:\Users\Admin\AppData\Local\Temp\G41D1.exe"116⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\HRO84.exe"C:\Users\Admin\AppData\Local\Temp\HRO84.exe"117⤵
- Checks computer location settings
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\K1K0G.exe"C:\Users\Admin\AppData\Local\Temp\K1K0G.exe"118⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\CV2LM.exe"C:\Users\Admin\AppData\Local\Temp\CV2LM.exe"119⤵PID:724
-
C:\Users\Admin\AppData\Local\Temp\C6L98.exe"C:\Users\Admin\AppData\Local\Temp\C6L98.exe"120⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\Q826S.exe"C:\Users\Admin\AppData\Local\Temp\Q826S.exe"121⤵
- Checks computer location settings
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\6B5Q1.exe"C:\Users\Admin\AppData\Local\Temp\6B5Q1.exe"122⤵
- Checks computer location settings
PID:212
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-