Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 00:39
Static task
static1
Behavioral task
behavioral1
Sample
9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe
Resource
win10v2004-20240704-en
General
-
Target
9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe
-
Size
1.0MB
-
MD5
d0bcac4da3a6de1274c3803f1859f0e6
-
SHA1
e536d602aa55999c965f7b892484f80591c2a611
-
SHA256
9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b
-
SHA512
f2b3a1cd9c330969a06b90e9110a43898a22810b4c4615a5f7aa08ddd2868028e1af6f349fb4f030b3ca555bba9a8b4c0edbba7593a5ec62e6a2d675d2019faa
-
SSDEEP
24576:FqOMFH5BhM6RwleQktOot0h9HyrOOfGOAY:4OMFHa6meHt0jSrOk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation P31SK.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation ZA171.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation H2TLH.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation YVH5E.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 7OX2Z.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 6091F.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation O135R.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation ZH15Y.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation T4N73.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 167AZ.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation M7LQ7.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation E2N61.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation CUSM6.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 7IJ5F.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation AE8WK.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 18T67.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 6954C.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 8U8GX.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation GZT56.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation GU86N.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation V6E54.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 5177U.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation M22G9.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation HQMLG.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 3EW10.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation D1VMM.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 2H9NG.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation G6N99.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 1X4DA.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation K6B7L.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 03W9N.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation R2LHB.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 8Z2Q5.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation HMY18.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 3IH49.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation N7NY7.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 38JAH.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 242OI.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation KC608.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation CKHKY.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 1PX1Q.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 21191.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation N3J89.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation G4H6S.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 1E05G.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 86XK5.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 8H7NT.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 7E6X4.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation J3H61.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 5CR12.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 14D60.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 2DWL4.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 6M6EY.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation O5172.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 34U9X.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation LU1MW.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 6VQK6.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 48B94.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 8Q74N.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation I99QN.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation WFFCV.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 612QI.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 69D87.exe -
Executes dropped EXE 64 IoCs
pid Process 2276 53389.exe 5036 211E2.exe 4504 4V72W.exe 3992 DQ2AA.exe 3848 8W5UV.exe 964 A3PGQ.exe 3488 WBO7G.exe 3884 16UB4.exe 2360 K7QJN.exe 1572 ZH15Y.exe 4616 1F3AS.exe 1320 25601.exe 2384 9Q7Q8.exe 3664 GZT56.exe 4380 O5172.exe 2340 7NE1W.exe 2612 M22G9.exe 1896 801U3.exe 212 9HZ4R.exe 2528 QI4OE.exe 704 71UYX.exe 4352 DH32Q.exe 4692 4UHU1.exe 2688 5932A.exe 2088 B1T44.exe 1468 M7LQ7.exe 4660 YVH5E.exe 4480 34U9X.exe 2984 6Z1FI.exe 4332 5PIR3.exe 3628 4LK54.exe 1320 84N0K.exe 4904 X3YE5.exe 3524 P31SK.exe 1816 S24CR.exe 680 A3MNA.exe 3500 0JK1N.exe 2312 IN4I5.exe 1072 X80AO.exe 4460 Y347Z.exe 2836 083AY.exe 4692 HQMLG.exe 2476 X38C5.exe 1276 7E6X4.exe 4864 07ZWG.exe 2456 3QPD8.exe 2428 62416.exe 2012 J4U8H.exe 2188 UXTDN.exe 864 E2N61.exe 3536 7V3Q1.exe 1480 1FT46.exe 540 8M1H9.exe 2720 D9091.exe 936 D1VMM.exe 264 I99QN.exe 116 KC608.exe 4220 8YG4S.exe 400 03W9N.exe 4328 8C6JA.exe 392 65SDE.exe 4432 E8RYB.exe 2532 HMY18.exe 4304 Y82BM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3380 9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe 3380 9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe 2276 53389.exe 2276 53389.exe 5036 211E2.exe 5036 211E2.exe 4504 4V72W.exe 4504 4V72W.exe 3992 DQ2AA.exe 3992 DQ2AA.exe 3848 8W5UV.exe 3848 8W5UV.exe 964 A3PGQ.exe 964 A3PGQ.exe 3488 WBO7G.exe 3488 WBO7G.exe 3884 16UB4.exe 3884 16UB4.exe 2360 K7QJN.exe 2360 K7QJN.exe 1572 ZH15Y.exe 1572 ZH15Y.exe 4616 1F3AS.exe 4616 1F3AS.exe 1320 25601.exe 1320 25601.exe 2384 9Q7Q8.exe 2384 9Q7Q8.exe 3664 GZT56.exe 3664 GZT56.exe 4380 O5172.exe 4380 O5172.exe 2340 7NE1W.exe 2340 7NE1W.exe 2612 M22G9.exe 2612 M22G9.exe 1896 801U3.exe 1896 801U3.exe 212 9HZ4R.exe 212 9HZ4R.exe 2528 QI4OE.exe 2528 QI4OE.exe 704 71UYX.exe 704 71UYX.exe 4352 DH32Q.exe 4352 DH32Q.exe 4692 4UHU1.exe 4692 4UHU1.exe 2688 5932A.exe 2688 5932A.exe 2088 B1T44.exe 2088 B1T44.exe 1468 M7LQ7.exe 1468 M7LQ7.exe 4660 YVH5E.exe 4660 YVH5E.exe 4480 34U9X.exe 4480 34U9X.exe 2984 6Z1FI.exe 2984 6Z1FI.exe 4332 5PIR3.exe 4332 5PIR3.exe 3628 4LK54.exe 3628 4LK54.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 2276 3380 9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe 85 PID 3380 wrote to memory of 2276 3380 9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe 85 PID 3380 wrote to memory of 2276 3380 9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe 85 PID 2276 wrote to memory of 5036 2276 53389.exe 87 PID 2276 wrote to memory of 5036 2276 53389.exe 87 PID 2276 wrote to memory of 5036 2276 53389.exe 87 PID 5036 wrote to memory of 4504 5036 211E2.exe 88 PID 5036 wrote to memory of 4504 5036 211E2.exe 88 PID 5036 wrote to memory of 4504 5036 211E2.exe 88 PID 4504 wrote to memory of 3992 4504 4V72W.exe 89 PID 4504 wrote to memory of 3992 4504 4V72W.exe 89 PID 4504 wrote to memory of 3992 4504 4V72W.exe 89 PID 3992 wrote to memory of 3848 3992 DQ2AA.exe 90 PID 3992 wrote to memory of 3848 3992 DQ2AA.exe 90 PID 3992 wrote to memory of 3848 3992 DQ2AA.exe 90 PID 3848 wrote to memory of 964 3848 8W5UV.exe 91 PID 3848 wrote to memory of 964 3848 8W5UV.exe 91 PID 3848 wrote to memory of 964 3848 8W5UV.exe 91 PID 964 wrote to memory of 3488 964 A3PGQ.exe 92 PID 964 wrote to memory of 3488 964 A3PGQ.exe 92 PID 964 wrote to memory of 3488 964 A3PGQ.exe 92 PID 3488 wrote to memory of 3884 3488 WBO7G.exe 93 PID 3488 wrote to memory of 3884 3488 WBO7G.exe 93 PID 3488 wrote to memory of 3884 3488 WBO7G.exe 93 PID 3884 wrote to memory of 2360 3884 16UB4.exe 94 PID 3884 wrote to memory of 2360 3884 16UB4.exe 94 PID 3884 wrote to memory of 2360 3884 16UB4.exe 94 PID 2360 wrote to memory of 1572 2360 K7QJN.exe 95 PID 2360 wrote to memory of 1572 2360 K7QJN.exe 95 PID 2360 wrote to memory of 1572 2360 K7QJN.exe 95 PID 1572 wrote to memory of 4616 1572 ZH15Y.exe 96 PID 1572 wrote to memory of 4616 1572 ZH15Y.exe 96 PID 1572 wrote to memory of 4616 1572 ZH15Y.exe 96 PID 4616 wrote to memory of 1320 4616 1F3AS.exe 97 PID 4616 wrote to memory of 1320 4616 1F3AS.exe 97 PID 4616 wrote to memory of 1320 4616 1F3AS.exe 97 PID 1320 wrote to memory of 2384 1320 25601.exe 98 PID 1320 wrote to memory of 2384 1320 25601.exe 98 PID 1320 wrote to memory of 2384 1320 25601.exe 98 PID 2384 wrote to memory of 3664 2384 9Q7Q8.exe 99 PID 2384 wrote to memory of 3664 2384 9Q7Q8.exe 99 PID 2384 wrote to memory of 3664 2384 9Q7Q8.exe 99 PID 3664 wrote to memory of 4380 3664 GZT56.exe 100 PID 3664 wrote to memory of 4380 3664 GZT56.exe 100 PID 3664 wrote to memory of 4380 3664 GZT56.exe 100 PID 4380 wrote to memory of 2340 4380 O5172.exe 101 PID 4380 wrote to memory of 2340 4380 O5172.exe 101 PID 4380 wrote to memory of 2340 4380 O5172.exe 101 PID 2340 wrote to memory of 2612 2340 7NE1W.exe 102 PID 2340 wrote to memory of 2612 2340 7NE1W.exe 102 PID 2340 wrote to memory of 2612 2340 7NE1W.exe 102 PID 2612 wrote to memory of 1896 2612 M22G9.exe 103 PID 2612 wrote to memory of 1896 2612 M22G9.exe 103 PID 2612 wrote to memory of 1896 2612 M22G9.exe 103 PID 1896 wrote to memory of 212 1896 801U3.exe 104 PID 1896 wrote to memory of 212 1896 801U3.exe 104 PID 1896 wrote to memory of 212 1896 801U3.exe 104 PID 212 wrote to memory of 2528 212 9HZ4R.exe 105 PID 212 wrote to memory of 2528 212 9HZ4R.exe 105 PID 212 wrote to memory of 2528 212 9HZ4R.exe 105 PID 2528 wrote to memory of 704 2528 QI4OE.exe 106 PID 2528 wrote to memory of 704 2528 QI4OE.exe 106 PID 2528 wrote to memory of 704 2528 QI4OE.exe 106 PID 704 wrote to memory of 4352 704 71UYX.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe"C:\Users\Admin\AppData\Local\Temp\9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\53389.exe"C:\Users\Admin\AppData\Local\Temp\53389.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\211E2.exe"C:\Users\Admin\AppData\Local\Temp\211E2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\4V72W.exe"C:\Users\Admin\AppData\Local\Temp\4V72W.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\DQ2AA.exe"C:\Users\Admin\AppData\Local\Temp\DQ2AA.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\8W5UV.exe"C:\Users\Admin\AppData\Local\Temp\8W5UV.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\A3PGQ.exe"C:\Users\Admin\AppData\Local\Temp\A3PGQ.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\WBO7G.exe"C:\Users\Admin\AppData\Local\Temp\WBO7G.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\16UB4.exe"C:\Users\Admin\AppData\Local\Temp\16UB4.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\K7QJN.exe"C:\Users\Admin\AppData\Local\Temp\K7QJN.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\ZH15Y.exe"C:\Users\Admin\AppData\Local\Temp\ZH15Y.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\1F3AS.exe"C:\Users\Admin\AppData\Local\Temp\1F3AS.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\25601.exe"C:\Users\Admin\AppData\Local\Temp\25601.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\9Q7Q8.exe"C:\Users\Admin\AppData\Local\Temp\9Q7Q8.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\GZT56.exe"C:\Users\Admin\AppData\Local\Temp\GZT56.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\O5172.exe"C:\Users\Admin\AppData\Local\Temp\O5172.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\7NE1W.exe"C:\Users\Admin\AppData\Local\Temp\7NE1W.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\M22G9.exe"C:\Users\Admin\AppData\Local\Temp\M22G9.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\801U3.exe"C:\Users\Admin\AppData\Local\Temp\801U3.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\9HZ4R.exe"C:\Users\Admin\AppData\Local\Temp\9HZ4R.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\QI4OE.exe"C:\Users\Admin\AppData\Local\Temp\QI4OE.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\71UYX.exe"C:\Users\Admin\AppData\Local\Temp\71UYX.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Local\Temp\DH32Q.exe"C:\Users\Admin\AppData\Local\Temp\DH32Q.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\4UHU1.exe"C:\Users\Admin\AppData\Local\Temp\4UHU1.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\5932A.exe"C:\Users\Admin\AppData\Local\Temp\5932A.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\B1T44.exe"C:\Users\Admin\AppData\Local\Temp\B1T44.exe"26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\M7LQ7.exe"C:\Users\Admin\AppData\Local\Temp\M7LQ7.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\YVH5E.exe"C:\Users\Admin\AppData\Local\Temp\YVH5E.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\34U9X.exe"C:\Users\Admin\AppData\Local\Temp\34U9X.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\6Z1FI.exe"C:\Users\Admin\AppData\Local\Temp\6Z1FI.exe"30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\5PIR3.exe"C:\Users\Admin\AppData\Local\Temp\5PIR3.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\4LK54.exe"C:\Users\Admin\AppData\Local\Temp\4LK54.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\84N0K.exe"C:\Users\Admin\AppData\Local\Temp\84N0K.exe"33⤵
- Executes dropped EXE
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\X3YE5.exe"C:\Users\Admin\AppData\Local\Temp\X3YE5.exe"34⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\P31SK.exe"C:\Users\Admin\AppData\Local\Temp\P31SK.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\S24CR.exe"C:\Users\Admin\AppData\Local\Temp\S24CR.exe"36⤵
- Executes dropped EXE
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\A3MNA.exe"C:\Users\Admin\AppData\Local\Temp\A3MNA.exe"37⤵
- Executes dropped EXE
PID:680 -
C:\Users\Admin\AppData\Local\Temp\0JK1N.exe"C:\Users\Admin\AppData\Local\Temp\0JK1N.exe"38⤵
- Executes dropped EXE
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\IN4I5.exe"C:\Users\Admin\AppData\Local\Temp\IN4I5.exe"39⤵
- Executes dropped EXE
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\X80AO.exe"C:\Users\Admin\AppData\Local\Temp\X80AO.exe"40⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Y347Z.exe"C:\Users\Admin\AppData\Local\Temp\Y347Z.exe"41⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\083AY.exe"C:\Users\Admin\AppData\Local\Temp\083AY.exe"42⤵
- Executes dropped EXE
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\HQMLG.exe"C:\Users\Admin\AppData\Local\Temp\HQMLG.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\X38C5.exe"C:\Users\Admin\AppData\Local\Temp\X38C5.exe"44⤵
- Executes dropped EXE
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\7E6X4.exe"C:\Users\Admin\AppData\Local\Temp\7E6X4.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\07ZWG.exe"C:\Users\Admin\AppData\Local\Temp\07ZWG.exe"46⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\3QPD8.exe"C:\Users\Admin\AppData\Local\Temp\3QPD8.exe"47⤵
- Executes dropped EXE
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\62416.exe"C:\Users\Admin\AppData\Local\Temp\62416.exe"48⤵
- Executes dropped EXE
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\J4U8H.exe"C:\Users\Admin\AppData\Local\Temp\J4U8H.exe"49⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\UXTDN.exe"C:\Users\Admin\AppData\Local\Temp\UXTDN.exe"50⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\E2N61.exe"C:\Users\Admin\AppData\Local\Temp\E2N61.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:864 -
C:\Users\Admin\AppData\Local\Temp\7V3Q1.exe"C:\Users\Admin\AppData\Local\Temp\7V3Q1.exe"52⤵
- Executes dropped EXE
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\1FT46.exe"C:\Users\Admin\AppData\Local\Temp\1FT46.exe"53⤵
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\8M1H9.exe"C:\Users\Admin\AppData\Local\Temp\8M1H9.exe"54⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\D9091.exe"C:\Users\Admin\AppData\Local\Temp\D9091.exe"55⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\D1VMM.exe"C:\Users\Admin\AppData\Local\Temp\D1VMM.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:936 -
C:\Users\Admin\AppData\Local\Temp\I99QN.exe"C:\Users\Admin\AppData\Local\Temp\I99QN.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:264 -
C:\Users\Admin\AppData\Local\Temp\KC608.exe"C:\Users\Admin\AppData\Local\Temp\KC608.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:116 -
C:\Users\Admin\AppData\Local\Temp\8YG4S.exe"C:\Users\Admin\AppData\Local\Temp\8YG4S.exe"59⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\03W9N.exe"C:\Users\Admin\AppData\Local\Temp\03W9N.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\8C6JA.exe"C:\Users\Admin\AppData\Local\Temp\8C6JA.exe"61⤵
- Executes dropped EXE
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\65SDE.exe"C:\Users\Admin\AppData\Local\Temp\65SDE.exe"62⤵
- Executes dropped EXE
PID:392 -
C:\Users\Admin\AppData\Local\Temp\E8RYB.exe"C:\Users\Admin\AppData\Local\Temp\E8RYB.exe"63⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\HMY18.exe"C:\Users\Admin\AppData\Local\Temp\HMY18.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Y82BM.exe"C:\Users\Admin\AppData\Local\Temp\Y82BM.exe"65⤵
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\5CR12.exe"C:\Users\Admin\AppData\Local\Temp\5CR12.exe"66⤵
- Checks computer location settings
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\M944S.exe"C:\Users\Admin\AppData\Local\Temp\M944S.exe"67⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\G32V7.exe"C:\Users\Admin\AppData\Local\Temp\G32V7.exe"68⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\ZA171.exe"C:\Users\Admin\AppData\Local\Temp\ZA171.exe"69⤵
- Checks computer location settings
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\92C50.exe"C:\Users\Admin\AppData\Local\Temp\92C50.exe"70⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Z9BY6.exe"C:\Users\Admin\AppData\Local\Temp\Z9BY6.exe"71⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\M0R69.exe"C:\Users\Admin\AppData\Local\Temp\M0R69.exe"72⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\TC6XM.exe"C:\Users\Admin\AppData\Local\Temp\TC6XM.exe"73⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\R2LHB.exe"C:\Users\Admin\AppData\Local\Temp\R2LHB.exe"74⤵
- Checks computer location settings
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\2H9NG.exe"C:\Users\Admin\AppData\Local\Temp\2H9NG.exe"75⤵
- Checks computer location settings
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\R794T.exe"C:\Users\Admin\AppData\Local\Temp\R794T.exe"76⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\NF677.exe"C:\Users\Admin\AppData\Local\Temp\NF677.exe"77⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\01DMB.exe"C:\Users\Admin\AppData\Local\Temp\01DMB.exe"78⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\7AFDK.exe"C:\Users\Admin\AppData\Local\Temp\7AFDK.exe"79⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\14D60.exe"C:\Users\Admin\AppData\Local\Temp\14D60.exe"80⤵
- Checks computer location settings
PID:116 -
C:\Users\Admin\AppData\Local\Temp\38C43.exe"C:\Users\Admin\AppData\Local\Temp\38C43.exe"81⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\C7NIO.exe"C:\Users\Admin\AppData\Local\Temp\C7NIO.exe"82⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\G9B32.exe"C:\Users\Admin\AppData\Local\Temp\G9B32.exe"83⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\QKIZ3.exe"C:\Users\Admin\AppData\Local\Temp\QKIZ3.exe"84⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\9NT6H.exe"C:\Users\Admin\AppData\Local\Temp\9NT6H.exe"85⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\7B6TF.exe"C:\Users\Admin\AppData\Local\Temp\7B6TF.exe"86⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\59709.exe"C:\Users\Admin\AppData\Local\Temp\59709.exe"87⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\GIC82.exe"C:\Users\Admin\AppData\Local\Temp\GIC82.exe"88⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\7OX2Z.exe"C:\Users\Admin\AppData\Local\Temp\7OX2Z.exe"89⤵
- Checks computer location settings
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\D7418.exe"C:\Users\Admin\AppData\Local\Temp\D7418.exe"90⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\FD468.exe"C:\Users\Admin\AppData\Local\Temp\FD468.exe"91⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\J3149.exe"C:\Users\Admin\AppData\Local\Temp\J3149.exe"92⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\OJ1X7.exe"C:\Users\Admin\AppData\Local\Temp\OJ1X7.exe"93⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\CKHKY.exe"C:\Users\Admin\AppData\Local\Temp\CKHKY.exe"94⤵
- Checks computer location settings
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\H9D20.exe"C:\Users\Admin\AppData\Local\Temp\H9D20.exe"95⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\2T1IG.exe"C:\Users\Admin\AppData\Local\Temp\2T1IG.exe"96⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\8HEI6.exe"C:\Users\Admin\AppData\Local\Temp\8HEI6.exe"97⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\467IX.exe"C:\Users\Admin\AppData\Local\Temp\467IX.exe"98⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\N1OKJ.exe"C:\Users\Admin\AppData\Local\Temp\N1OKJ.exe"99⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\5M9D5.exe"C:\Users\Admin\AppData\Local\Temp\5M9D5.exe"100⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\G6N99.exe"C:\Users\Admin\AppData\Local\Temp\G6N99.exe"101⤵
- Checks computer location settings
PID:60 -
C:\Users\Admin\AppData\Local\Temp\X3564.exe"C:\Users\Admin\AppData\Local\Temp\X3564.exe"102⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\0QT4S.exe"C:\Users\Admin\AppData\Local\Temp\0QT4S.exe"103⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\JYI8P.exe"C:\Users\Admin\AppData\Local\Temp\JYI8P.exe"104⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\REC48.exe"C:\Users\Admin\AppData\Local\Temp\REC48.exe"105⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\1912K.exe"C:\Users\Admin\AppData\Local\Temp\1912K.exe"106⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\U8HD3.exe"C:\Users\Admin\AppData\Local\Temp\U8HD3.exe"107⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\KWBNX.exe"C:\Users\Admin\AppData\Local\Temp\KWBNX.exe"108⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\8QY0K.exe"C:\Users\Admin\AppData\Local\Temp\8QY0K.exe"109⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\4MGYR.exe"C:\Users\Admin\AppData\Local\Temp\4MGYR.exe"110⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\8VKOV.exe"C:\Users\Admin\AppData\Local\Temp\8VKOV.exe"111⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\XG107.exe"C:\Users\Admin\AppData\Local\Temp\XG107.exe"112⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\8IBT1.exe"C:\Users\Admin\AppData\Local\Temp\8IBT1.exe"113⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\J3H61.exe"C:\Users\Admin\AppData\Local\Temp\J3H61.exe"114⤵
- Checks computer location settings
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\N3J89.exe"C:\Users\Admin\AppData\Local\Temp\N3J89.exe"115⤵
- Checks computer location settings
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\6091F.exe"C:\Users\Admin\AppData\Local\Temp\6091F.exe"116⤵
- Checks computer location settings
PID:536 -
C:\Users\Admin\AppData\Local\Temp\9HF0C.exe"C:\Users\Admin\AppData\Local\Temp\9HF0C.exe"117⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\K5MP7.exe"C:\Users\Admin\AppData\Local\Temp\K5MP7.exe"118⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\58YE7.exe"C:\Users\Admin\AppData\Local\Temp\58YE7.exe"119⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\GU86N.exe"C:\Users\Admin\AppData\Local\Temp\GU86N.exe"120⤵
- Checks computer location settings
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\V6E54.exe"C:\Users\Admin\AppData\Local\Temp\V6E54.exe"121⤵
- Checks computer location settings
PID:624 -
C:\Users\Admin\AppData\Local\Temp\020IM.exe"C:\Users\Admin\AppData\Local\Temp\020IM.exe"122⤵PID:3440
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-