Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
268f34901dd50077b2d151aa9cfa38e64d7115db632262a100512cf5744701cbN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
268f34901dd50077b2d151aa9cfa38e64d7115db632262a100512cf5744701cbN.exe
Resource
win10v2004-20240802-en
General
-
Target
268f34901dd50077b2d151aa9cfa38e64d7115db632262a100512cf5744701cbN.exe
-
Size
1.8MB
-
MD5
148679c9e63ad454aef3bf74998372c0
-
SHA1
ab889cd742e50c0e891a5ca1214051a43df05bfb
-
SHA256
268f34901dd50077b2d151aa9cfa38e64d7115db632262a100512cf5744701cb
-
SHA512
c12dcb8de54cc7630b47cb496e870cb996dbae506c6d85c13e78c9c5df7bbc487a6a99e0bf0e068878f2fcbf543a40636e69a1c3a483735697cae8306171ac33
-
SSDEEP
49152:tylFHUv6ReIt0jSrOogENXwu3qCqtKBjJj4BI:0lFHU85t0jS/gENAu6ChJjAI
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2428 SJAE2.exe 2200 L9894.exe 2720 WHJ48.exe 2596 BT2MP.exe 2612 M24QV.exe 2604 4O55K.exe 3064 PF299.exe 2040 DES3E.exe 1928 87MJO.exe 2336 HTBD7.exe 2012 4VX73.exe 1316 8265G.exe 320 874FW.exe 2356 ZH14U.exe 1236 PS345.exe 448 01LWG.exe 1864 0L9AN.exe 1532 F129Z.exe 1664 39745.exe 556 1MQ1S.exe 2128 MH2J8.exe 2132 RPRCJ.exe 2208 W2L1U.exe 2528 6CQ1H.exe 1556 OKNK4.exe 2536 N4KKZ.exe 2860 R18W7.exe 2436 4R831.exe 2200 TZ380.exe 2792 S1B59.exe 2752 L31FT.exe 2596 86AY3.exe 2588 OA1SU.exe 1816 5Q5YV.exe 580 09Y33.exe 2420 B6G1I.exe 1920 V8LED.exe 1612 10FO1.exe 1800 I08S0.exe 536 X7AJ1.exe 1992 507C0.exe 1148 2A8TY.exe 2088 G8GV2.exe 1600 YQGU1.exe 2356 ZV99O.exe 1236 8D3L2.exe 448 RXEWS.exe 1360 421BQ.exe 620 R58D5.exe 840 5556M.exe 2312 06038.exe 2924 1OJ0U.exe 2548 5V8F1.exe 1048 24LO5.exe 884 44RJ9.exe 2984 21C04.exe 2560 8L57H.exe 2804 67949.exe 2732 043AH.exe 2872 324RE.exe 2728 B2186.exe 2620 2PU58.exe 2600 50Z50.exe 1504 227IC.exe -
Loads dropped DLL 64 IoCs
pid Process 2980 268f34901dd50077b2d151aa9cfa38e64d7115db632262a100512cf5744701cbN.exe 2980 268f34901dd50077b2d151aa9cfa38e64d7115db632262a100512cf5744701cbN.exe 2428 SJAE2.exe 2428 SJAE2.exe 2200 L9894.exe 2200 L9894.exe 2720 WHJ48.exe 2720 WHJ48.exe 2596 BT2MP.exe 2596 BT2MP.exe 2612 M24QV.exe 2612 M24QV.exe 2604 4O55K.exe 2604 4O55K.exe 3064 PF299.exe 3064 PF299.exe 2040 DES3E.exe 2040 DES3E.exe 1928 87MJO.exe 1928 87MJO.exe 2336 HTBD7.exe 2336 HTBD7.exe 2012 4VX73.exe 2012 4VX73.exe 1316 8265G.exe 1316 8265G.exe 320 874FW.exe 320 874FW.exe 2356 ZH14U.exe 2356 ZH14U.exe 1236 PS345.exe 1236 PS345.exe 448 01LWG.exe 448 01LWG.exe 1864 0L9AN.exe 1864 0L9AN.exe 1532 F129Z.exe 1532 F129Z.exe 1664 39745.exe 1664 39745.exe 556 1MQ1S.exe 556 1MQ1S.exe 2128 MH2J8.exe 2128 MH2J8.exe 2132 RPRCJ.exe 2132 RPRCJ.exe 2208 W2L1U.exe 2208 W2L1U.exe 2528 6CQ1H.exe 2528 6CQ1H.exe 1556 OKNK4.exe 1556 OKNK4.exe 2536 N4KKZ.exe 2536 N4KKZ.exe 2860 R18W7.exe 2860 R18W7.exe 2436 4R831.exe 2436 4R831.exe 2200 TZ380.exe 2200 TZ380.exe 2792 S1B59.exe 2792 S1B59.exe 2752 L31FT.exe 2752 L31FT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4R831.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00R3G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language T6H10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1U22L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44RJ9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 227IC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language T430G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6Y09L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PY2EO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MZA11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4KMD9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1MQ1S.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WTO5Q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54HJ2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4TGK8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7WKNS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0058R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12ORY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RL3DV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DG4RB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language V3W6P.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3FL75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62ZC2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2829O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9QNFO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P1Q6T.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57P2T.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3Y4WB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X5W4T.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TG899.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9K66S.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FDBGD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ZQQ1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language K30RK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TOT6M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1I632.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KXA1Q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y6OC1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 043AH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M6XPH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44P9F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D762B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C546H.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OA1SU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JSQ15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4UP6Y.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15M2U.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 665H9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DJ61F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LI0NH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y0UL5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CCGS9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1P180.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OU247.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75529.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5K0FB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1QM88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8AG48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2V7WR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88GBS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 553Y7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B2186.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AP1G1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75IRM.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2980 268f34901dd50077b2d151aa9cfa38e64d7115db632262a100512cf5744701cbN.exe 2980 268f34901dd50077b2d151aa9cfa38e64d7115db632262a100512cf5744701cbN.exe 2428 SJAE2.exe 2428 SJAE2.exe 2200 L9894.exe 2200 L9894.exe 2720 WHJ48.exe 2720 WHJ48.exe 2596 BT2MP.exe 2596 BT2MP.exe 2612 M24QV.exe 2612 M24QV.exe 2604 4O55K.exe 2604 4O55K.exe 3064 PF299.exe 3064 PF299.exe 2040 DES3E.exe 2040 DES3E.exe 1928 87MJO.exe 1928 87MJO.exe 2336 HTBD7.exe 2336 HTBD7.exe 2012 4VX73.exe 2012 4VX73.exe 1316 8265G.exe 1316 8265G.exe 320 874FW.exe 320 874FW.exe 2356 ZH14U.exe 2356 ZH14U.exe 1236 PS345.exe 1236 PS345.exe 448 01LWG.exe 448 01LWG.exe 1864 0L9AN.exe 1864 0L9AN.exe 1532 F129Z.exe 1532 F129Z.exe 1664 39745.exe 1664 39745.exe 556 1MQ1S.exe 556 1MQ1S.exe 2128 MH2J8.exe 2128 MH2J8.exe 2132 RPRCJ.exe 2132 RPRCJ.exe 2208 W2L1U.exe 2208 W2L1U.exe 2528 6CQ1H.exe 2528 6CQ1H.exe 1556 OKNK4.exe 1556 OKNK4.exe 2536 N4KKZ.exe 2536 N4KKZ.exe 2860 R18W7.exe 2860 R18W7.exe 2436 4R831.exe 2436 4R831.exe 2200 TZ380.exe 2200 TZ380.exe 2792 S1B59.exe 2792 S1B59.exe 2752 L31FT.exe 2752 L31FT.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2428 2980 268f34901dd50077b2d151aa9cfa38e64d7115db632262a100512cf5744701cbN.exe 30 PID 2980 wrote to memory of 2428 2980 268f34901dd50077b2d151aa9cfa38e64d7115db632262a100512cf5744701cbN.exe 30 PID 2980 wrote to memory of 2428 2980 268f34901dd50077b2d151aa9cfa38e64d7115db632262a100512cf5744701cbN.exe 30 PID 2980 wrote to memory of 2428 2980 268f34901dd50077b2d151aa9cfa38e64d7115db632262a100512cf5744701cbN.exe 30 PID 2428 wrote to memory of 2200 2428 SJAE2.exe 31 PID 2428 wrote to memory of 2200 2428 SJAE2.exe 31 PID 2428 wrote to memory of 2200 2428 SJAE2.exe 31 PID 2428 wrote to memory of 2200 2428 SJAE2.exe 31 PID 2200 wrote to memory of 2720 2200 L9894.exe 32 PID 2200 wrote to memory of 2720 2200 L9894.exe 32 PID 2200 wrote to memory of 2720 2200 L9894.exe 32 PID 2200 wrote to memory of 2720 2200 L9894.exe 32 PID 2720 wrote to memory of 2596 2720 WHJ48.exe 33 PID 2720 wrote to memory of 2596 2720 WHJ48.exe 33 PID 2720 wrote to memory of 2596 2720 WHJ48.exe 33 PID 2720 wrote to memory of 2596 2720 WHJ48.exe 33 PID 2596 wrote to memory of 2612 2596 BT2MP.exe 34 PID 2596 wrote to memory of 2612 2596 BT2MP.exe 34 PID 2596 wrote to memory of 2612 2596 BT2MP.exe 34 PID 2596 wrote to memory of 2612 2596 BT2MP.exe 34 PID 2612 wrote to memory of 2604 2612 M24QV.exe 35 PID 2612 wrote to memory of 2604 2612 M24QV.exe 35 PID 2612 wrote to memory of 2604 2612 M24QV.exe 35 PID 2612 wrote to memory of 2604 2612 M24QV.exe 35 PID 2604 wrote to memory of 3064 2604 4O55K.exe 36 PID 2604 wrote to memory of 3064 2604 4O55K.exe 36 PID 2604 wrote to memory of 3064 2604 4O55K.exe 36 PID 2604 wrote to memory of 3064 2604 4O55K.exe 36 PID 3064 wrote to memory of 2040 3064 PF299.exe 37 PID 3064 wrote to memory of 2040 3064 PF299.exe 37 PID 3064 wrote to memory of 2040 3064 PF299.exe 37 PID 3064 wrote to memory of 2040 3064 PF299.exe 37 PID 2040 wrote to memory of 1928 2040 DES3E.exe 38 PID 2040 wrote to memory of 1928 2040 DES3E.exe 38 PID 2040 wrote to memory of 1928 2040 DES3E.exe 38 PID 2040 wrote to memory of 1928 2040 DES3E.exe 38 PID 1928 wrote to memory of 2336 1928 87MJO.exe 39 PID 1928 wrote to memory of 2336 1928 87MJO.exe 39 PID 1928 wrote to memory of 2336 1928 87MJO.exe 39 PID 1928 wrote to memory of 2336 1928 87MJO.exe 39 PID 2336 wrote to memory of 2012 2336 HTBD7.exe 40 PID 2336 wrote to memory of 2012 2336 HTBD7.exe 40 PID 2336 wrote to memory of 2012 2336 HTBD7.exe 40 PID 2336 wrote to memory of 2012 2336 HTBD7.exe 40 PID 2012 wrote to memory of 1316 2012 4VX73.exe 41 PID 2012 wrote to memory of 1316 2012 4VX73.exe 41 PID 2012 wrote to memory of 1316 2012 4VX73.exe 41 PID 2012 wrote to memory of 1316 2012 4VX73.exe 41 PID 1316 wrote to memory of 320 1316 8265G.exe 42 PID 1316 wrote to memory of 320 1316 8265G.exe 42 PID 1316 wrote to memory of 320 1316 8265G.exe 42 PID 1316 wrote to memory of 320 1316 8265G.exe 42 PID 320 wrote to memory of 2356 320 874FW.exe 43 PID 320 wrote to memory of 2356 320 874FW.exe 43 PID 320 wrote to memory of 2356 320 874FW.exe 43 PID 320 wrote to memory of 2356 320 874FW.exe 43 PID 2356 wrote to memory of 1236 2356 ZH14U.exe 44 PID 2356 wrote to memory of 1236 2356 ZH14U.exe 44 PID 2356 wrote to memory of 1236 2356 ZH14U.exe 44 PID 2356 wrote to memory of 1236 2356 ZH14U.exe 44 PID 1236 wrote to memory of 448 1236 PS345.exe 45 PID 1236 wrote to memory of 448 1236 PS345.exe 45 PID 1236 wrote to memory of 448 1236 PS345.exe 45 PID 1236 wrote to memory of 448 1236 PS345.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\268f34901dd50077b2d151aa9cfa38e64d7115db632262a100512cf5744701cbN.exe"C:\Users\Admin\AppData\Local\Temp\268f34901dd50077b2d151aa9cfa38e64d7115db632262a100512cf5744701cbN.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\SJAE2.exe"C:\Users\Admin\AppData\Local\Temp\SJAE2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\L9894.exe"C:\Users\Admin\AppData\Local\Temp\L9894.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\WHJ48.exe"C:\Users\Admin\AppData\Local\Temp\WHJ48.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\BT2MP.exe"C:\Users\Admin\AppData\Local\Temp\BT2MP.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\M24QV.exe"C:\Users\Admin\AppData\Local\Temp\M24QV.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\4O55K.exe"C:\Users\Admin\AppData\Local\Temp\4O55K.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\PF299.exe"C:\Users\Admin\AppData\Local\Temp\PF299.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\DES3E.exe"C:\Users\Admin\AppData\Local\Temp\DES3E.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\87MJO.exe"C:\Users\Admin\AppData\Local\Temp\87MJO.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\HTBD7.exe"C:\Users\Admin\AppData\Local\Temp\HTBD7.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\4VX73.exe"C:\Users\Admin\AppData\Local\Temp\4VX73.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\8265G.exe"C:\Users\Admin\AppData\Local\Temp\8265G.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\874FW.exe"C:\Users\Admin\AppData\Local\Temp\874FW.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\ZH14U.exe"C:\Users\Admin\AppData\Local\Temp\ZH14U.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\PS345.exe"C:\Users\Admin\AppData\Local\Temp\PS345.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\01LWG.exe"C:\Users\Admin\AppData\Local\Temp\01LWG.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:448 -
C:\Users\Admin\AppData\Local\Temp\0L9AN.exe"C:\Users\Admin\AppData\Local\Temp\0L9AN.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\F129Z.exe"C:\Users\Admin\AppData\Local\Temp\F129Z.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\39745.exe"C:\Users\Admin\AppData\Local\Temp\39745.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\1MQ1S.exe"C:\Users\Admin\AppData\Local\Temp\1MQ1S.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:556 -
C:\Users\Admin\AppData\Local\Temp\MH2J8.exe"C:\Users\Admin\AppData\Local\Temp\MH2J8.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\RPRCJ.exe"C:\Users\Admin\AppData\Local\Temp\RPRCJ.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\W2L1U.exe"C:\Users\Admin\AppData\Local\Temp\W2L1U.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\6CQ1H.exe"C:\Users\Admin\AppData\Local\Temp\6CQ1H.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\OKNK4.exe"C:\Users\Admin\AppData\Local\Temp\OKNK4.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\N4KKZ.exe"C:\Users\Admin\AppData\Local\Temp\N4KKZ.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\R18W7.exe"C:\Users\Admin\AppData\Local\Temp\R18W7.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\4R831.exe"C:\Users\Admin\AppData\Local\Temp\4R831.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\TZ380.exe"C:\Users\Admin\AppData\Local\Temp\TZ380.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\S1B59.exe"C:\Users\Admin\AppData\Local\Temp\S1B59.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\L31FT.exe"C:\Users\Admin\AppData\Local\Temp\L31FT.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\86AY3.exe"C:\Users\Admin\AppData\Local\Temp\86AY3.exe"33⤵
- Executes dropped EXE
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\OA1SU.exe"C:\Users\Admin\AppData\Local\Temp\OA1SU.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\5Q5YV.exe"C:\Users\Admin\AppData\Local\Temp\5Q5YV.exe"35⤵
- Executes dropped EXE
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\09Y33.exe"C:\Users\Admin\AppData\Local\Temp\09Y33.exe"36⤵
- Executes dropped EXE
PID:580 -
C:\Users\Admin\AppData\Local\Temp\B6G1I.exe"C:\Users\Admin\AppData\Local\Temp\B6G1I.exe"37⤵
- Executes dropped EXE
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\V8LED.exe"C:\Users\Admin\AppData\Local\Temp\V8LED.exe"38⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\10FO1.exe"C:\Users\Admin\AppData\Local\Temp\10FO1.exe"39⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\I08S0.exe"C:\Users\Admin\AppData\Local\Temp\I08S0.exe"40⤵
- Executes dropped EXE
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\X7AJ1.exe"C:\Users\Admin\AppData\Local\Temp\X7AJ1.exe"41⤵
- Executes dropped EXE
PID:536 -
C:\Users\Admin\AppData\Local\Temp\507C0.exe"C:\Users\Admin\AppData\Local\Temp\507C0.exe"42⤵
- Executes dropped EXE
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\2A8TY.exe"C:\Users\Admin\AppData\Local\Temp\2A8TY.exe"43⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\G8GV2.exe"C:\Users\Admin\AppData\Local\Temp\G8GV2.exe"44⤵
- Executes dropped EXE
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\YQGU1.exe"C:\Users\Admin\AppData\Local\Temp\YQGU1.exe"45⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\ZV99O.exe"C:\Users\Admin\AppData\Local\Temp\ZV99O.exe"46⤵
- Executes dropped EXE
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\8D3L2.exe"C:\Users\Admin\AppData\Local\Temp\8D3L2.exe"47⤵
- Executes dropped EXE
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\RXEWS.exe"C:\Users\Admin\AppData\Local\Temp\RXEWS.exe"48⤵
- Executes dropped EXE
PID:448 -
C:\Users\Admin\AppData\Local\Temp\421BQ.exe"C:\Users\Admin\AppData\Local\Temp\421BQ.exe"49⤵
- Executes dropped EXE
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\R58D5.exe"C:\Users\Admin\AppData\Local\Temp\R58D5.exe"50⤵
- Executes dropped EXE
PID:620 -
C:\Users\Admin\AppData\Local\Temp\5556M.exe"C:\Users\Admin\AppData\Local\Temp\5556M.exe"51⤵
- Executes dropped EXE
PID:840 -
C:\Users\Admin\AppData\Local\Temp\06038.exe"C:\Users\Admin\AppData\Local\Temp\06038.exe"52⤵
- Executes dropped EXE
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\1OJ0U.exe"C:\Users\Admin\AppData\Local\Temp\1OJ0U.exe"53⤵
- Executes dropped EXE
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\5V8F1.exe"C:\Users\Admin\AppData\Local\Temp\5V8F1.exe"54⤵
- Executes dropped EXE
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\24LO5.exe"C:\Users\Admin\AppData\Local\Temp\24LO5.exe"55⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\44RJ9.exe"C:\Users\Admin\AppData\Local\Temp\44RJ9.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:884 -
C:\Users\Admin\AppData\Local\Temp\21C04.exe"C:\Users\Admin\AppData\Local\Temp\21C04.exe"57⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\8L57H.exe"C:\Users\Admin\AppData\Local\Temp\8L57H.exe"58⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\67949.exe"C:\Users\Admin\AppData\Local\Temp\67949.exe"59⤵
- Executes dropped EXE
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\043AH.exe"C:\Users\Admin\AppData\Local\Temp\043AH.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\324RE.exe"C:\Users\Admin\AppData\Local\Temp\324RE.exe"61⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\B2186.exe"C:\Users\Admin\AppData\Local\Temp\B2186.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\2PU58.exe"C:\Users\Admin\AppData\Local\Temp\2PU58.exe"63⤵
- Executes dropped EXE
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\50Z50.exe"C:\Users\Admin\AppData\Local\Temp\50Z50.exe"64⤵
- Executes dropped EXE
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\227IC.exe"C:\Users\Admin\AppData\Local\Temp\227IC.exe"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\5JHN1.exe"C:\Users\Admin\AppData\Local\Temp\5JHN1.exe"66⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\3EJRW.exe"C:\Users\Admin\AppData\Local\Temp\3EJRW.exe"67⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\3SA2M.exe"C:\Users\Admin\AppData\Local\Temp\3SA2M.exe"68⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\2G69O.exe"C:\Users\Admin\AppData\Local\Temp\2G69O.exe"69⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\90P7B.exe"C:\Users\Admin\AppData\Local\Temp\90P7B.exe"70⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\7M1O7.exe"C:\Users\Admin\AppData\Local\Temp\7M1O7.exe"71⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\1ZRE8.exe"C:\Users\Admin\AppData\Local\Temp\1ZRE8.exe"72⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\91O92.exe"C:\Users\Admin\AppData\Local\Temp\91O92.exe"73⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\1V97R.exe"C:\Users\Admin\AppData\Local\Temp\1V97R.exe"74⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\0JSF3.exe"C:\Users\Admin\AppData\Local\Temp\0JSF3.exe"75⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\P4EG7.exe"C:\Users\Admin\AppData\Local\Temp\P4EG7.exe"76⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\WXJ32.exe"C:\Users\Admin\AppData\Local\Temp\WXJ32.exe"77⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\2K7J3.exe"C:\Users\Admin\AppData\Local\Temp\2K7J3.exe"78⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\6MZ3Y.exe"C:\Users\Admin\AppData\Local\Temp\6MZ3Y.exe"79⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\QUK4Z.exe"C:\Users\Admin\AppData\Local\Temp\QUK4Z.exe"80⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\05421.exe"C:\Users\Admin\AppData\Local\Temp\05421.exe"81⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\2178U.exe"C:\Users\Admin\AppData\Local\Temp\2178U.exe"82⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\W69A7.exe"C:\Users\Admin\AppData\Local\Temp\W69A7.exe"83⤵PID:276
-
C:\Users\Admin\AppData\Local\Temp\2K770.exe"C:\Users\Admin\AppData\Local\Temp\2K770.exe"84⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\5491L.exe"C:\Users\Admin\AppData\Local\Temp\5491L.exe"85⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\1QM88.exe"C:\Users\Admin\AppData\Local\Temp\1QM88.exe"86⤵
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\641T6.exe"C:\Users\Admin\AppData\Local\Temp\641T6.exe"87⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\6QOL5.exe"C:\Users\Admin\AppData\Local\Temp\6QOL5.exe"88⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\S734V.exe"C:\Users\Admin\AppData\Local\Temp\S734V.exe"89⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\AM4N5.exe"C:\Users\Admin\AppData\Local\Temp\AM4N5.exe"90⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\WTO5Q.exe"C:\Users\Admin\AppData\Local\Temp\WTO5Q.exe"91⤵
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\8N9C1.exe"C:\Users\Admin\AppData\Local\Temp\8N9C1.exe"92⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\6B64Z.exe"C:\Users\Admin\AppData\Local\Temp\6B64Z.exe"93⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\J9A4K.exe"C:\Users\Admin\AppData\Local\Temp\J9A4K.exe"94⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\111L2.exe"C:\Users\Admin\AppData\Local\Temp\111L2.exe"95⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\C2OWO.exe"C:\Users\Admin\AppData\Local\Temp\C2OWO.exe"96⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\H0UAC.exe"C:\Users\Admin\AppData\Local\Temp\H0UAC.exe"97⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\602QD.exe"C:\Users\Admin\AppData\Local\Temp\602QD.exe"98⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\NSN02.exe"C:\Users\Admin\AppData\Local\Temp\NSN02.exe"99⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\DOVA9.exe"C:\Users\Admin\AppData\Local\Temp\DOVA9.exe"100⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\G3PEL.exe"C:\Users\Admin\AppData\Local\Temp\G3PEL.exe"101⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\3ZRF1.exe"C:\Users\Admin\AppData\Local\Temp\3ZRF1.exe"102⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\688QG.exe"C:\Users\Admin\AppData\Local\Temp\688QG.exe"103⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\GVMAZ.exe"C:\Users\Admin\AppData\Local\Temp\GVMAZ.exe"104⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\K905K.exe"C:\Users\Admin\AppData\Local\Temp\K905K.exe"105⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\3KCT3.exe"C:\Users\Admin\AppData\Local\Temp\3KCT3.exe"106⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\59E94.exe"C:\Users\Admin\AppData\Local\Temp\59E94.exe"107⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\Q9PV1.exe"C:\Users\Admin\AppData\Local\Temp\Q9PV1.exe"108⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\7XGBH.exe"C:\Users\Admin\AppData\Local\Temp\7XGBH.exe"109⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\5UX9Y.exe"C:\Users\Admin\AppData\Local\Temp\5UX9Y.exe"110⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\2HZT2.exe"C:\Users\Admin\AppData\Local\Temp\2HZT2.exe"111⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\209X6.exe"C:\Users\Admin\AppData\Local\Temp\209X6.exe"112⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\7VEBD.exe"C:\Users\Admin\AppData\Local\Temp\7VEBD.exe"113⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\8JOFW.exe"C:\Users\Admin\AppData\Local\Temp\8JOFW.exe"114⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\T430G.exe"C:\Users\Admin\AppData\Local\Temp\T430G.exe"115⤵
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\0W7N5.exe"C:\Users\Admin\AppData\Local\Temp\0W7N5.exe"116⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\R5BZY.exe"C:\Users\Admin\AppData\Local\Temp\R5BZY.exe"117⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\3X5IQ.exe"C:\Users\Admin\AppData\Local\Temp\3X5IQ.exe"118⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\KZD64.exe"C:\Users\Admin\AppData\Local\Temp\KZD64.exe"119⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\1TTWH.exe"C:\Users\Admin\AppData\Local\Temp\1TTWH.exe"120⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\54Y66.exe"C:\Users\Admin\AppData\Local\Temp\54Y66.exe"121⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\S44G9.exe"C:\Users\Admin\AppData\Local\Temp\S44G9.exe"122⤵PID:2384
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-