Analysis
-
max time kernel
113s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 08:13
Behavioral task
behavioral1
Sample
79bb48ad8f2c9ff2dd1b398a2080990136ec5b5186de25a01fd2373ecfa89ef2N.exe
Resource
win7-20240903-en
General
-
Target
79bb48ad8f2c9ff2dd1b398a2080990136ec5b5186de25a01fd2373ecfa89ef2N.exe
-
Size
435KB
-
MD5
bb12c87bfcaf74a7f891aea3b4a89f30
-
SHA1
06fbe0ff97e561b47a6150aed1786d94d988b01b
-
SHA256
79bb48ad8f2c9ff2dd1b398a2080990136ec5b5186de25a01fd2373ecfa89ef2
-
SHA512
e077c9ddbce20377d20600b80261166fd509e6593b1177b2fa44feb7cbf26ef8237a4c2ef44e6ee7a9a9ce625f17182e82580c0f58bfc615aa6c883fe46cc062
-
SSDEEP
12288:PTf1aDMWvl/SaVcHSRhS5pVEFHdDne9OvlFCo:PRaDjvlqaVw2+U9D5Hf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 6V35G.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation P2366.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RZ70X.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 4TP83.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 3M679.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation G222Z.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation QW4O0.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 0Y0R8.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 7WEY0.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 1Y989.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation Q9IO2.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 231ZJ.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation DT1Z3.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation D13FD.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 17BB8.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 1JZY8.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation R69KC.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation IWZXZ.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 4FYAA.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 32J26.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation O19B7.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation OKS9N.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation YPBZ8.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation LILD6.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 73C14.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 68N51.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation WWU57.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation E0Z9U.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation EX328.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 5W493.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 27772.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 0U7J9.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation GHNX7.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SF53B.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 0GO6Z.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 932ID.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation VH14W.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation I48ED.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 2L0RQ.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 63Z0K.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 2G366.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation HF234.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation K824B.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 9S7FF.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 80872.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 65271.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 47M4X.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation F4X4U.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 0CUO1.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 47773.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 6LQYZ.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 9KSC8.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation CY9XJ.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 797RI.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 6095I.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 33I9F.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 3IH49.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 1E05G.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation OY7Z2.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation EF2CE.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 12424.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 19U40.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation J0Y46.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation OHHC2.exe -
Executes dropped EXE 64 IoCs
pid Process 2220 M875F.exe 4760 64922.exe 2344 DR592.exe 2340 DP1S4.exe 3232 9KSC8.exe 3496 Z9KW4.exe 3376 M7M81.exe 4708 K824B.exe 444 NMTD1.exe 1492 141G0.exe 4852 47M4X.exe 2924 6VRX6.exe 932 D4Z9Q.exe 1096 9S7FF.exe 5016 5B0S5.exe 2856 XBU32.exe 4980 12424.exe 4348 A0B7V.exe 2340 FL0VM.exe 4236 E2ZL0.exe 3496 3J6M0.exe 1740 CO038.exe 3588 HS2G4.exe 3756 68N51.exe 5056 CY9XJ.exe 932 27772.exe 2972 6WT55.exe 2220 F4X4U.exe 4508 953LN.exe 1652 KB6AW.exe 3232 0D34S.exe 1444 8R1KI.exe 2588 V9LFD.exe 4716 6095I.exe 3496 2U1P2.exe 720 A3MNA.exe 2324 2ZI78.exe 4924 7WEY0.exe 4428 S64YQ.exe 1408 WWU57.exe 1160 FB6U3.exe 2972 0U7J9.exe 4888 W1T9Y.exe 4508 B82LP.exe 2336 5YVF2.exe 4768 D13FD.exe 4284 S72GW.exe 2208 WRA60.exe 4696 7A5YX.exe 3376 SQX0J.exe 3656 932ID.exe 5036 424V5.exe 1636 Z4M0S.exe 4460 I48ED.exe 3780 948L3.exe 3968 X0UFW.exe 4252 O07M9.exe 2484 2M291.exe 220 XU4IJ.exe 1228 79603.exe 3644 94819.exe 1964 G222Z.exe 472 ZL8CL.exe 2012 B561G.exe -
resource yara_rule behavioral2/memory/2244-0-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0010000000023bda-5.dat upx behavioral2/memory/2244-9-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023caf-17.dat upx behavioral2/memory/4760-18-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/2220-20-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/4760-30-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cb0-29.dat upx behavioral2/files/0x0007000000023cb1-37.dat upx behavioral2/memory/2340-39-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/2344-41-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cb2-48.dat upx behavioral2/memory/2340-50-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0003000000022aaa-58.dat upx behavioral2/memory/3232-61-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/3496-59-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cb3-68.dat upx behavioral2/memory/3496-71-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0003000000022a91-79.dat upx behavioral2/memory/3376-82-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/4708-80-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000d000000023b63-90.dat upx behavioral2/memory/444-91-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/4708-93-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/444-102-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cb4-101.dat upx behavioral2/files/0x0007000000023cb6-110.dat upx behavioral2/memory/1492-112-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cb7-120.dat upx behavioral2/memory/4852-122-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cb8-130.dat upx behavioral2/memory/2924-132-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000400000001da0e-139.dat upx behavioral2/memory/932-142-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0008000000023cbb-150.dat upx behavioral2/memory/1096-151-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000600000001da47-158.dat upx behavioral2/memory/2856-160-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/5016-161-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000800000001e438-168.dat upx behavioral2/memory/2856-171-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000d000000023b60-178.dat upx behavioral2/memory/4980-181-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cbc-189.dat upx behavioral2/memory/4348-191-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cbd-199.dat upx behavioral2/memory/2340-201-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cbe-209.dat upx behavioral2/memory/3496-210-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/4236-212-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cbf-219.dat upx behavioral2/memory/3496-222-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cc0-230.dat upx behavioral2/memory/3588-231-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/1740-233-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cc1-240.dat upx behavioral2/memory/3588-243-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cc3-250.dat upx behavioral2/memory/3756-254-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/5056-253-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cc6-262.dat upx behavioral2/memory/5056-264-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023cc7-272.dat upx behavioral2/memory/2972-274-0x0000000000400000-0x000000000053B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R840M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2WSAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37W18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language I48ED.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AVD0R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2L0RQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24F39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WWU57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R69KC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language O8B51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W805Q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42G16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63206.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DR592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z9KW4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5Z6T4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0GO6Z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CSA2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94819.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AQTB4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W1T9Y.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0KZ71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D4Z9Q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0U7J9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2912T.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32J26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N6B9W.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RZ70X.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CY9XJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GQI2V.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UCH9D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D13FD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52363.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UE63R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 948L3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C3603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E0Z9U.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2X21I.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IPJG8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DP1S4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3J6M0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12424.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1JZY8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 797RI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AX217.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86ZL8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMZ7K.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5W493.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 953LN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63Z0K.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y00EM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SM19B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5YVF2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9251J.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1EXP2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 231ZJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S72GW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42PCR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20N6D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M875F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Q9IO2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HHCO9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZL8CL.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2244 79bb48ad8f2c9ff2dd1b398a2080990136ec5b5186de25a01fd2373ecfa89ef2N.exe 2244 79bb48ad8f2c9ff2dd1b398a2080990136ec5b5186de25a01fd2373ecfa89ef2N.exe 2220 M875F.exe 2220 M875F.exe 4760 64922.exe 4760 64922.exe 2344 DR592.exe 2344 DR592.exe 2340 DP1S4.exe 2340 DP1S4.exe 3232 9KSC8.exe 3232 9KSC8.exe 3496 Z9KW4.exe 3496 Z9KW4.exe 3376 M7M81.exe 3376 M7M81.exe 4708 K824B.exe 4708 K824B.exe 444 NMTD1.exe 444 NMTD1.exe 1492 141G0.exe 1492 141G0.exe 4852 47M4X.exe 4852 47M4X.exe 2924 6VRX6.exe 2924 6VRX6.exe 932 D4Z9Q.exe 932 D4Z9Q.exe 1096 9S7FF.exe 1096 9S7FF.exe 5016 5B0S5.exe 5016 5B0S5.exe 2856 XBU32.exe 2856 XBU32.exe 4980 12424.exe 4980 12424.exe 4348 A0B7V.exe 4348 A0B7V.exe 2340 FL0VM.exe 2340 FL0VM.exe 4236 E2ZL0.exe 4236 E2ZL0.exe 3496 3J6M0.exe 3496 3J6M0.exe 1740 CO038.exe 1740 CO038.exe 3588 HS2G4.exe 3588 HS2G4.exe 3756 68N51.exe 3756 68N51.exe 5056 CY9XJ.exe 5056 CY9XJ.exe 932 27772.exe 932 27772.exe 2972 6WT55.exe 2972 6WT55.exe 2220 F4X4U.exe 2220 F4X4U.exe 4508 953LN.exe 4508 953LN.exe 1652 KB6AW.exe 1652 KB6AW.exe 3232 0D34S.exe 3232 0D34S.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2220 2244 79bb48ad8f2c9ff2dd1b398a2080990136ec5b5186de25a01fd2373ecfa89ef2N.exe 86 PID 2244 wrote to memory of 2220 2244 79bb48ad8f2c9ff2dd1b398a2080990136ec5b5186de25a01fd2373ecfa89ef2N.exe 86 PID 2244 wrote to memory of 2220 2244 79bb48ad8f2c9ff2dd1b398a2080990136ec5b5186de25a01fd2373ecfa89ef2N.exe 86 PID 2220 wrote to memory of 4760 2220 M875F.exe 87 PID 2220 wrote to memory of 4760 2220 M875F.exe 87 PID 2220 wrote to memory of 4760 2220 M875F.exe 87 PID 4760 wrote to memory of 2344 4760 64922.exe 89 PID 4760 wrote to memory of 2344 4760 64922.exe 89 PID 4760 wrote to memory of 2344 4760 64922.exe 89 PID 2344 wrote to memory of 2340 2344 DR592.exe 90 PID 2344 wrote to memory of 2340 2344 DR592.exe 90 PID 2344 wrote to memory of 2340 2344 DR592.exe 90 PID 2340 wrote to memory of 3232 2340 DP1S4.exe 91 PID 2340 wrote to memory of 3232 2340 DP1S4.exe 91 PID 2340 wrote to memory of 3232 2340 DP1S4.exe 91 PID 3232 wrote to memory of 3496 3232 9KSC8.exe 92 PID 3232 wrote to memory of 3496 3232 9KSC8.exe 92 PID 3232 wrote to memory of 3496 3232 9KSC8.exe 92 PID 3496 wrote to memory of 3376 3496 Z9KW4.exe 95 PID 3496 wrote to memory of 3376 3496 Z9KW4.exe 95 PID 3496 wrote to memory of 3376 3496 Z9KW4.exe 95 PID 3376 wrote to memory of 4708 3376 M7M81.exe 96 PID 3376 wrote to memory of 4708 3376 M7M81.exe 96 PID 3376 wrote to memory of 4708 3376 M7M81.exe 96 PID 4708 wrote to memory of 444 4708 K824B.exe 97 PID 4708 wrote to memory of 444 4708 K824B.exe 97 PID 4708 wrote to memory of 444 4708 K824B.exe 97 PID 444 wrote to memory of 1492 444 NMTD1.exe 99 PID 444 wrote to memory of 1492 444 NMTD1.exe 99 PID 444 wrote to memory of 1492 444 NMTD1.exe 99 PID 1492 wrote to memory of 4852 1492 141G0.exe 101 PID 1492 wrote to memory of 4852 1492 141G0.exe 101 PID 1492 wrote to memory of 4852 1492 141G0.exe 101 PID 4852 wrote to memory of 2924 4852 47M4X.exe 102 PID 4852 wrote to memory of 2924 4852 47M4X.exe 102 PID 4852 wrote to memory of 2924 4852 47M4X.exe 102 PID 2924 wrote to memory of 932 2924 6VRX6.exe 103 PID 2924 wrote to memory of 932 2924 6VRX6.exe 103 PID 2924 wrote to memory of 932 2924 6VRX6.exe 103 PID 932 wrote to memory of 1096 932 D4Z9Q.exe 104 PID 932 wrote to memory of 1096 932 D4Z9Q.exe 104 PID 932 wrote to memory of 1096 932 D4Z9Q.exe 104 PID 1096 wrote to memory of 5016 1096 9S7FF.exe 105 PID 1096 wrote to memory of 5016 1096 9S7FF.exe 105 PID 1096 wrote to memory of 5016 1096 9S7FF.exe 105 PID 5016 wrote to memory of 2856 5016 5B0S5.exe 106 PID 5016 wrote to memory of 2856 5016 5B0S5.exe 106 PID 5016 wrote to memory of 2856 5016 5B0S5.exe 106 PID 2856 wrote to memory of 4980 2856 XBU32.exe 107 PID 2856 wrote to memory of 4980 2856 XBU32.exe 107 PID 2856 wrote to memory of 4980 2856 XBU32.exe 107 PID 4980 wrote to memory of 4348 4980 12424.exe 108 PID 4980 wrote to memory of 4348 4980 12424.exe 108 PID 4980 wrote to memory of 4348 4980 12424.exe 108 PID 4348 wrote to memory of 2340 4348 A0B7V.exe 110 PID 4348 wrote to memory of 2340 4348 A0B7V.exe 110 PID 4348 wrote to memory of 2340 4348 A0B7V.exe 110 PID 2340 wrote to memory of 4236 2340 FL0VM.exe 111 PID 2340 wrote to memory of 4236 2340 FL0VM.exe 111 PID 2340 wrote to memory of 4236 2340 FL0VM.exe 111 PID 4236 wrote to memory of 3496 4236 E2ZL0.exe 128 PID 4236 wrote to memory of 3496 4236 E2ZL0.exe 128 PID 4236 wrote to memory of 3496 4236 E2ZL0.exe 128 PID 3496 wrote to memory of 1740 3496 3J6M0.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\79bb48ad8f2c9ff2dd1b398a2080990136ec5b5186de25a01fd2373ecfa89ef2N.exe"C:\Users\Admin\AppData\Local\Temp\79bb48ad8f2c9ff2dd1b398a2080990136ec5b5186de25a01fd2373ecfa89ef2N.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\M875F.exe"C:\Users\Admin\AppData\Local\Temp\M875F.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\64922.exe"C:\Users\Admin\AppData\Local\Temp\64922.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\DR592.exe"C:\Users\Admin\AppData\Local\Temp\DR592.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\DP1S4.exe"C:\Users\Admin\AppData\Local\Temp\DP1S4.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\9KSC8.exe"C:\Users\Admin\AppData\Local\Temp\9KSC8.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\Z9KW4.exe"C:\Users\Admin\AppData\Local\Temp\Z9KW4.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\M7M81.exe"C:\Users\Admin\AppData\Local\Temp\M7M81.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\K824B.exe"C:\Users\Admin\AppData\Local\Temp\K824B.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\NMTD1.exe"C:\Users\Admin\AppData\Local\Temp\NMTD1.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\141G0.exe"C:\Users\Admin\AppData\Local\Temp\141G0.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\47M4X.exe"C:\Users\Admin\AppData\Local\Temp\47M4X.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\6VRX6.exe"C:\Users\Admin\AppData\Local\Temp\6VRX6.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\D4Z9Q.exe"C:\Users\Admin\AppData\Local\Temp\D4Z9Q.exe"14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\9S7FF.exe"C:\Users\Admin\AppData\Local\Temp\9S7FF.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\5B0S5.exe"C:\Users\Admin\AppData\Local\Temp\5B0S5.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\XBU32.exe"C:\Users\Admin\AppData\Local\Temp\XBU32.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\12424.exe"C:\Users\Admin\AppData\Local\Temp\12424.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\A0B7V.exe"C:\Users\Admin\AppData\Local\Temp\A0B7V.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\FL0VM.exe"C:\Users\Admin\AppData\Local\Temp\FL0VM.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\E2ZL0.exe"C:\Users\Admin\AppData\Local\Temp\E2ZL0.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\3J6M0.exe"C:\Users\Admin\AppData\Local\Temp\3J6M0.exe"22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\CO038.exe"C:\Users\Admin\AppData\Local\Temp\CO038.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\HS2G4.exe"C:\Users\Admin\AppData\Local\Temp\HS2G4.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\68N51.exe"C:\Users\Admin\AppData\Local\Temp\68N51.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\CY9XJ.exe"C:\Users\Admin\AppData\Local\Temp\CY9XJ.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\27772.exe"C:\Users\Admin\AppData\Local\Temp\27772.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:932 -
C:\Users\Admin\AppData\Local\Temp\6WT55.exe"C:\Users\Admin\AppData\Local\Temp\6WT55.exe"28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\F4X4U.exe"C:\Users\Admin\AppData\Local\Temp\F4X4U.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\953LN.exe"C:\Users\Admin\AppData\Local\Temp\953LN.exe"30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\KB6AW.exe"C:\Users\Admin\AppData\Local\Temp\KB6AW.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\0D34S.exe"C:\Users\Admin\AppData\Local\Temp\0D34S.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\8R1KI.exe"C:\Users\Admin\AppData\Local\Temp\8R1KI.exe"33⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\V9LFD.exe"C:\Users\Admin\AppData\Local\Temp\V9LFD.exe"34⤵
- Executes dropped EXE
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\6095I.exe"C:\Users\Admin\AppData\Local\Temp\6095I.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\2U1P2.exe"C:\Users\Admin\AppData\Local\Temp\2U1P2.exe"36⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\A3MNA.exe"C:\Users\Admin\AppData\Local\Temp\A3MNA.exe"37⤵
- Executes dropped EXE
PID:720 -
C:\Users\Admin\AppData\Local\Temp\2ZI78.exe"C:\Users\Admin\AppData\Local\Temp\2ZI78.exe"38⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\7WEY0.exe"C:\Users\Admin\AppData\Local\Temp\7WEY0.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\S64YQ.exe"C:\Users\Admin\AppData\Local\Temp\S64YQ.exe"40⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\WWU57.exe"C:\Users\Admin\AppData\Local\Temp\WWU57.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\FB6U3.exe"C:\Users\Admin\AppData\Local\Temp\FB6U3.exe"42⤵
- Executes dropped EXE
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\0U7J9.exe"C:\Users\Admin\AppData\Local\Temp\0U7J9.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\W1T9Y.exe"C:\Users\Admin\AppData\Local\Temp\W1T9Y.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\B82LP.exe"C:\Users\Admin\AppData\Local\Temp\B82LP.exe"45⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\5YVF2.exe"C:\Users\Admin\AppData\Local\Temp\5YVF2.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\D13FD.exe"C:\Users\Admin\AppData\Local\Temp\D13FD.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\S72GW.exe"C:\Users\Admin\AppData\Local\Temp\S72GW.exe"48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\WRA60.exe"C:\Users\Admin\AppData\Local\Temp\WRA60.exe"49⤵
- Executes dropped EXE
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\7A5YX.exe"C:\Users\Admin\AppData\Local\Temp\7A5YX.exe"50⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\SQX0J.exe"C:\Users\Admin\AppData\Local\Temp\SQX0J.exe"51⤵
- Executes dropped EXE
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\932ID.exe"C:\Users\Admin\AppData\Local\Temp\932ID.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\424V5.exe"C:\Users\Admin\AppData\Local\Temp\424V5.exe"53⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\Z4M0S.exe"C:\Users\Admin\AppData\Local\Temp\Z4M0S.exe"54⤵
- Executes dropped EXE
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\I48ED.exe"C:\Users\Admin\AppData\Local\Temp\I48ED.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\948L3.exe"C:\Users\Admin\AppData\Local\Temp\948L3.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\X0UFW.exe"C:\Users\Admin\AppData\Local\Temp\X0UFW.exe"57⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\O07M9.exe"C:\Users\Admin\AppData\Local\Temp\O07M9.exe"58⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\2M291.exe"C:\Users\Admin\AppData\Local\Temp\2M291.exe"59⤵
- Executes dropped EXE
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\XU4IJ.exe"C:\Users\Admin\AppData\Local\Temp\XU4IJ.exe"60⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\79603.exe"C:\Users\Admin\AppData\Local\Temp\79603.exe"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\94819.exe"C:\Users\Admin\AppData\Local\Temp\94819.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\G222Z.exe"C:\Users\Admin\AppData\Local\Temp\G222Z.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\ZL8CL.exe"C:\Users\Admin\AppData\Local\Temp\ZL8CL.exe"64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:472 -
C:\Users\Admin\AppData\Local\Temp\B561G.exe"C:\Users\Admin\AppData\Local\Temp\B561G.exe"65⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\AVD0R.exe"C:\Users\Admin\AppData\Local\Temp\AVD0R.exe"66⤵
- System Location Discovery: System Language Discovery
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\51I47.exe"C:\Users\Admin\AppData\Local\Temp\51I47.exe"67⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\7107D.exe"C:\Users\Admin\AppData\Local\Temp\7107D.exe"68⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\R69KC.exe"C:\Users\Admin\AppData\Local\Temp\R69KC.exe"69⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\62Q54.exe"C:\Users\Admin\AppData\Local\Temp\62Q54.exe"70⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\6YBI6.exe"C:\Users\Admin\AppData\Local\Temp\6YBI6.exe"71⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\G7118.exe"C:\Users\Admin\AppData\Local\Temp\G7118.exe"72⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\6V35G.exe"C:\Users\Admin\AppData\Local\Temp\6V35G.exe"73⤵
- Checks computer location settings
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\AX217.exe"C:\Users\Admin\AppData\Local\Temp\AX217.exe"74⤵
- System Location Discovery: System Language Discovery
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\52363.exe"C:\Users\Admin\AppData\Local\Temp\52363.exe"75⤵
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\6U474.exe"C:\Users\Admin\AppData\Local\Temp\6U474.exe"76⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\LS3LQ.exe"C:\Users\Admin\AppData\Local\Temp\LS3LQ.exe"77⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\0CUO1.exe"C:\Users\Admin\AppData\Local\Temp\0CUO1.exe"78⤵
- Checks computer location settings
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\O8B51.exe"C:\Users\Admin\AppData\Local\Temp\O8B51.exe"79⤵
- System Location Discovery: System Language Discovery
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\3Q1GR.exe"C:\Users\Admin\AppData\Local\Temp\3Q1GR.exe"80⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\HE87H.exe"C:\Users\Admin\AppData\Local\Temp\HE87H.exe"81⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\2L0RQ.exe"C:\Users\Admin\AppData\Local\Temp\2L0RQ.exe"82⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\70N9J.exe"C:\Users\Admin\AppData\Local\Temp\70N9J.exe"83⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\2WSAF.exe"C:\Users\Admin\AppData\Local\Temp\2WSAF.exe"84⤵
- System Location Discovery: System Language Discovery
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\E0Z9U.exe"C:\Users\Admin\AppData\Local\Temp\E0Z9U.exe"85⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\32J26.exe"C:\Users\Admin\AppData\Local\Temp\32J26.exe"86⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\70LT6.exe"C:\Users\Admin\AppData\Local\Temp\70LT6.exe"87⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\2JYD1.exe"C:\Users\Admin\AppData\Local\Temp\2JYD1.exe"88⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\63Z0K.exe"C:\Users\Admin\AppData\Local\Temp\63Z0K.exe"89⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\VNKZ4.exe"C:\Users\Admin\AppData\Local\Temp\VNKZ4.exe"90⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\3G8O7.exe"C:\Users\Admin\AppData\Local\Temp\3G8O7.exe"91⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\EX328.exe"C:\Users\Admin\AppData\Local\Temp\EX328.exe"92⤵
- Checks computer location settings
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\80872.exe"C:\Users\Admin\AppData\Local\Temp\80872.exe"93⤵
- Checks computer location settings
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\23G58.exe"C:\Users\Admin\AppData\Local\Temp\23G58.exe"94⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\24F39.exe"C:\Users\Admin\AppData\Local\Temp\24F39.exe"95⤵
- System Location Discovery: System Language Discovery
PID:900 -
C:\Users\Admin\AppData\Local\Temp\17BB8.exe"C:\Users\Admin\AppData\Local\Temp\17BB8.exe"96⤵
- Checks computer location settings
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\BLI9P.exe"C:\Users\Admin\AppData\Local\Temp\BLI9P.exe"97⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\N6B9W.exe"C:\Users\Admin\AppData\Local\Temp\N6B9W.exe"98⤵
- System Location Discovery: System Language Discovery
PID:368 -
C:\Users\Admin\AppData\Local\Temp\Q9IO2.exe"C:\Users\Admin\AppData\Local\Temp\Q9IO2.exe"99⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\G7S5I.exe"C:\Users\Admin\AppData\Local\Temp\G7S5I.exe"100⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\2OQ8Y.exe"C:\Users\Admin\AppData\Local\Temp\2OQ8Y.exe"101⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\VH14W.exe"C:\Users\Admin\AppData\Local\Temp\VH14W.exe"102⤵
- Checks computer location settings
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\1K0HW.exe"C:\Users\Admin\AppData\Local\Temp\1K0HW.exe"103⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\88S92.exe"C:\Users\Admin\AppData\Local\Temp\88S92.exe"104⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\19U40.exe"C:\Users\Admin\AppData\Local\Temp\19U40.exe"105⤵
- Checks computer location settings
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\L0894.exe"C:\Users\Admin\AppData\Local\Temp\L0894.exe"106⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\4O3X8.exe"C:\Users\Admin\AppData\Local\Temp\4O3X8.exe"107⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\Q241F.exe"C:\Users\Admin\AppData\Local\Temp\Q241F.exe"108⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\OKS9N.exe"C:\Users\Admin\AppData\Local\Temp\OKS9N.exe"109⤵
- Checks computer location settings
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\5UNF4.exe"C:\Users\Admin\AppData\Local\Temp\5UNF4.exe"110⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\O19B7.exe"C:\Users\Admin\AppData\Local\Temp\O19B7.exe"111⤵
- Checks computer location settings
PID:700 -
C:\Users\Admin\AppData\Local\Temp\5PZ6O.exe"C:\Users\Admin\AppData\Local\Temp\5PZ6O.exe"112⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\GQI2V.exe"C:\Users\Admin\AppData\Local\Temp\GQI2V.exe"113⤵
- System Location Discovery: System Language Discovery
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\0E4K7.exe"C:\Users\Admin\AppData\Local\Temp\0E4K7.exe"114⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\W805Q.exe"C:\Users\Admin\AppData\Local\Temp\W805Q.exe"115⤵
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\47773.exe"C:\Users\Admin\AppData\Local\Temp\47773.exe"116⤵
- Checks computer location settings
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\J52DP.exe"C:\Users\Admin\AppData\Local\Temp\J52DP.exe"117⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\Z5XK5.exe"C:\Users\Admin\AppData\Local\Temp\Z5XK5.exe"118⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\I8U9Z.exe"C:\Users\Admin\AppData\Local\Temp\I8U9Z.exe"119⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\P2366.exe"C:\Users\Admin\AppData\Local\Temp\P2366.exe"120⤵
- Checks computer location settings
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\JM1PM.exe"C:\Users\Admin\AppData\Local\Temp\JM1PM.exe"121⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\GHNX7.exe"C:\Users\Admin\AppData\Local\Temp\GHNX7.exe"122⤵
- Checks computer location settings
PID:4896
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-