Analysis
-
max time kernel
84s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
bc51bd63471dbb6576467f3191c557c5c5138148cac9a8a309e89aeb29d5ee39.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc51bd63471dbb6576467f3191c557c5c5138148cac9a8a309e89aeb29d5ee39.exe
Resource
win10v2004-20241007-en
General
-
Target
bc51bd63471dbb6576467f3191c557c5c5138148cac9a8a309e89aeb29d5ee39.exe
-
Size
1.8MB
-
MD5
dc3d324ac5363ec4a80eaf93ee9166cc
-
SHA1
5804bf9c5314886a8a59b5d7bd97641a444f1ae9
-
SHA256
bc51bd63471dbb6576467f3191c557c5c5138148cac9a8a309e89aeb29d5ee39
-
SHA512
25d71dda46d9850bdbdd7dca08ec1ae299c9459adcbc5172c6e22f957dd88248979b1fe85df439b63f262d6d3eb6c123f8f709ecb0ac2e87d517aac69dc4d464
-
SSDEEP
49152:tylFHUv6ReIt0jSrOogENXwu3qCqtKBjJj4Bn:0lFHU85t0jS/gENAu6ChJjAn
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2300 1TY72.exe 2808 EUC6X.exe 2636 EB9BH.exe 2820 MI7L6.exe 988 56577.exe 2592 IRE01.exe 2600 8QGN8.exe 2608 T59TB.exe 856 G3WOU.exe 2236 239MD.exe 2436 GVT3P.exe 2316 41Y5C.exe 2448 M3OO0.exe 2304 520L6.exe 1800 I24S3.exe 3036 795TH.exe 968 Z3B64.exe 1560 9R80Z.exe 1980 8E267.exe 936 Y3F6U.exe 2116 307UX.exe 2520 RN2W2.exe 1508 9T9GX.exe 1524 K778N.exe 1612 OHIS1.exe 2776 DCXFT.exe 2756 7EL9P.exe 2672 P2WI4.exe 1808 QZV8P.exe 2896 SYAZ3.exe 1504 9BJ63.exe 2132 E9367.exe 576 0B3XS.exe 1512 HI3H2.exe 2800 V0OI7.exe 1952 762KW.exe 2928 17734.exe 2720 0722E.exe 1296 76OFD.exe 1880 RSZ41.exe 2140 2OH27.exe 2460 N339N.exe 2232 E74H9.exe 2456 3X417.exe 3032 0629U.exe 692 O3352.exe 1664 3DG34.exe 1356 XTLQV.exe 1360 7U3Z6.exe 1980 MGPY7.exe 936 7KOSF.exe 2116 OB5S7.exe 2172 C03L3.exe 1048 V64CZ.exe 1620 21XLM.exe 1612 58OE9.exe 2300 856DV.exe 2780 V6H49.exe 2192 18731.exe 2732 U278T.exe 2684 134U8.exe 1084 3516P.exe 1204 FX5NR.exe 2312 94OH5.exe -
Loads dropped DLL 64 IoCs
pid Process 2888 bc51bd63471dbb6576467f3191c557c5c5138148cac9a8a309e89aeb29d5ee39.exe 2888 bc51bd63471dbb6576467f3191c557c5c5138148cac9a8a309e89aeb29d5ee39.exe 2300 1TY72.exe 2300 1TY72.exe 2808 EUC6X.exe 2808 EUC6X.exe 2636 EB9BH.exe 2636 EB9BH.exe 2820 MI7L6.exe 2820 MI7L6.exe 988 56577.exe 988 56577.exe 2592 IRE01.exe 2592 IRE01.exe 2600 8QGN8.exe 2600 8QGN8.exe 2608 T59TB.exe 2608 T59TB.exe 856 G3WOU.exe 856 G3WOU.exe 2236 239MD.exe 2236 239MD.exe 2436 GVT3P.exe 2436 GVT3P.exe 2316 41Y5C.exe 2316 41Y5C.exe 2448 M3OO0.exe 2448 M3OO0.exe 2304 520L6.exe 2304 520L6.exe 1800 I24S3.exe 1800 I24S3.exe 3036 795TH.exe 3036 795TH.exe 968 Z3B64.exe 968 Z3B64.exe 1560 9R80Z.exe 1560 9R80Z.exe 1980 8E267.exe 1980 8E267.exe 936 Y3F6U.exe 936 Y3F6U.exe 2116 307UX.exe 2116 307UX.exe 2520 RN2W2.exe 2520 RN2W2.exe 1508 9T9GX.exe 1508 9T9GX.exe 1524 K778N.exe 1524 K778N.exe 1612 OHIS1.exe 1612 OHIS1.exe 2776 DCXFT.exe 2776 DCXFT.exe 2756 7EL9P.exe 2756 7EL9P.exe 2672 P2WI4.exe 2672 P2WI4.exe 1808 QZV8P.exe 1808 QZV8P.exe 2896 SYAZ3.exe 2896 SYAZ3.exe 1504 9BJ63.exe 1504 9BJ63.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4FB97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0BP40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R6OGK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4L8MG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A0800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0257H.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24B2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27ON8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U97J9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language V4OZ4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 954F9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QSU24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H24NO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EZNG8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PZR16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z20LL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1TY72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57N7P.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U86B1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KKVRK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TMY7E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L897D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54V35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JX7SP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4O0A3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9FC4M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0V60L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A84F1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5C1H7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F2F9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21672.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9R80Z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12LQ2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9Q817.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WHYE4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M4362.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 922HE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0O1Z5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z098Z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93966.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17734.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7U3Z6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2CXXA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AO2RM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05REA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6MT49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N2HB4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76OFD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 558FU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4AJQ4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U61NU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QC3YE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4WP5V.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B3XS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F5TPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IF35G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5GUL3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BEBGY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06B9C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EL9P.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3P99P.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XZP5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39CIA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0722E.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2888 bc51bd63471dbb6576467f3191c557c5c5138148cac9a8a309e89aeb29d5ee39.exe 2888 bc51bd63471dbb6576467f3191c557c5c5138148cac9a8a309e89aeb29d5ee39.exe 2300 1TY72.exe 2300 1TY72.exe 2808 EUC6X.exe 2808 EUC6X.exe 2636 EB9BH.exe 2636 EB9BH.exe 2820 MI7L6.exe 2820 MI7L6.exe 988 56577.exe 988 56577.exe 2592 IRE01.exe 2592 IRE01.exe 2600 8QGN8.exe 2600 8QGN8.exe 2608 T59TB.exe 2608 T59TB.exe 856 G3WOU.exe 856 G3WOU.exe 2236 239MD.exe 2236 239MD.exe 2436 GVT3P.exe 2436 GVT3P.exe 2316 41Y5C.exe 2316 41Y5C.exe 2448 M3OO0.exe 2448 M3OO0.exe 2304 520L6.exe 2304 520L6.exe 1800 I24S3.exe 1800 I24S3.exe 3036 795TH.exe 3036 795TH.exe 968 Z3B64.exe 968 Z3B64.exe 1560 9R80Z.exe 1560 9R80Z.exe 1980 8E267.exe 1980 8E267.exe 936 Y3F6U.exe 936 Y3F6U.exe 2116 307UX.exe 2116 307UX.exe 2520 RN2W2.exe 2520 RN2W2.exe 1508 9T9GX.exe 1508 9T9GX.exe 1524 K778N.exe 1524 K778N.exe 1612 OHIS1.exe 1612 OHIS1.exe 2776 DCXFT.exe 2776 DCXFT.exe 2756 7EL9P.exe 2756 7EL9P.exe 2672 P2WI4.exe 2672 P2WI4.exe 1808 QZV8P.exe 1808 QZV8P.exe 2896 SYAZ3.exe 2896 SYAZ3.exe 1504 9BJ63.exe 1504 9BJ63.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2300 2888 bc51bd63471dbb6576467f3191c557c5c5138148cac9a8a309e89aeb29d5ee39.exe 30 PID 2888 wrote to memory of 2300 2888 bc51bd63471dbb6576467f3191c557c5c5138148cac9a8a309e89aeb29d5ee39.exe 30 PID 2888 wrote to memory of 2300 2888 bc51bd63471dbb6576467f3191c557c5c5138148cac9a8a309e89aeb29d5ee39.exe 30 PID 2888 wrote to memory of 2300 2888 bc51bd63471dbb6576467f3191c557c5c5138148cac9a8a309e89aeb29d5ee39.exe 30 PID 2300 wrote to memory of 2808 2300 1TY72.exe 31 PID 2300 wrote to memory of 2808 2300 1TY72.exe 31 PID 2300 wrote to memory of 2808 2300 1TY72.exe 31 PID 2300 wrote to memory of 2808 2300 1TY72.exe 31 PID 2808 wrote to memory of 2636 2808 EUC6X.exe 32 PID 2808 wrote to memory of 2636 2808 EUC6X.exe 32 PID 2808 wrote to memory of 2636 2808 EUC6X.exe 32 PID 2808 wrote to memory of 2636 2808 EUC6X.exe 32 PID 2636 wrote to memory of 2820 2636 EB9BH.exe 33 PID 2636 wrote to memory of 2820 2636 EB9BH.exe 33 PID 2636 wrote to memory of 2820 2636 EB9BH.exe 33 PID 2636 wrote to memory of 2820 2636 EB9BH.exe 33 PID 2820 wrote to memory of 988 2820 MI7L6.exe 34 PID 2820 wrote to memory of 988 2820 MI7L6.exe 34 PID 2820 wrote to memory of 988 2820 MI7L6.exe 34 PID 2820 wrote to memory of 988 2820 MI7L6.exe 34 PID 988 wrote to memory of 2592 988 56577.exe 35 PID 988 wrote to memory of 2592 988 56577.exe 35 PID 988 wrote to memory of 2592 988 56577.exe 35 PID 988 wrote to memory of 2592 988 56577.exe 35 PID 2592 wrote to memory of 2600 2592 IRE01.exe 36 PID 2592 wrote to memory of 2600 2592 IRE01.exe 36 PID 2592 wrote to memory of 2600 2592 IRE01.exe 36 PID 2592 wrote to memory of 2600 2592 IRE01.exe 36 PID 2600 wrote to memory of 2608 2600 8QGN8.exe 37 PID 2600 wrote to memory of 2608 2600 8QGN8.exe 37 PID 2600 wrote to memory of 2608 2600 8QGN8.exe 37 PID 2600 wrote to memory of 2608 2600 8QGN8.exe 37 PID 2608 wrote to memory of 856 2608 T59TB.exe 38 PID 2608 wrote to memory of 856 2608 T59TB.exe 38 PID 2608 wrote to memory of 856 2608 T59TB.exe 38 PID 2608 wrote to memory of 856 2608 T59TB.exe 38 PID 856 wrote to memory of 2236 856 G3WOU.exe 39 PID 856 wrote to memory of 2236 856 G3WOU.exe 39 PID 856 wrote to memory of 2236 856 G3WOU.exe 39 PID 856 wrote to memory of 2236 856 G3WOU.exe 39 PID 2236 wrote to memory of 2436 2236 239MD.exe 40 PID 2236 wrote to memory of 2436 2236 239MD.exe 40 PID 2236 wrote to memory of 2436 2236 239MD.exe 40 PID 2236 wrote to memory of 2436 2236 239MD.exe 40 PID 2436 wrote to memory of 2316 2436 GVT3P.exe 41 PID 2436 wrote to memory of 2316 2436 GVT3P.exe 41 PID 2436 wrote to memory of 2316 2436 GVT3P.exe 41 PID 2436 wrote to memory of 2316 2436 GVT3P.exe 41 PID 2316 wrote to memory of 2448 2316 41Y5C.exe 42 PID 2316 wrote to memory of 2448 2316 41Y5C.exe 42 PID 2316 wrote to memory of 2448 2316 41Y5C.exe 42 PID 2316 wrote to memory of 2448 2316 41Y5C.exe 42 PID 2448 wrote to memory of 2304 2448 M3OO0.exe 43 PID 2448 wrote to memory of 2304 2448 M3OO0.exe 43 PID 2448 wrote to memory of 2304 2448 M3OO0.exe 43 PID 2448 wrote to memory of 2304 2448 M3OO0.exe 43 PID 2304 wrote to memory of 1800 2304 520L6.exe 44 PID 2304 wrote to memory of 1800 2304 520L6.exe 44 PID 2304 wrote to memory of 1800 2304 520L6.exe 44 PID 2304 wrote to memory of 1800 2304 520L6.exe 44 PID 1800 wrote to memory of 3036 1800 I24S3.exe 45 PID 1800 wrote to memory of 3036 1800 I24S3.exe 45 PID 1800 wrote to memory of 3036 1800 I24S3.exe 45 PID 1800 wrote to memory of 3036 1800 I24S3.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc51bd63471dbb6576467f3191c557c5c5138148cac9a8a309e89aeb29d5ee39.exe"C:\Users\Admin\AppData\Local\Temp\bc51bd63471dbb6576467f3191c557c5c5138148cac9a8a309e89aeb29d5ee39.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\1TY72.exe"C:\Users\Admin\AppData\Local\Temp\1TY72.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\EUC6X.exe"C:\Users\Admin\AppData\Local\Temp\EUC6X.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\EB9BH.exe"C:\Users\Admin\AppData\Local\Temp\EB9BH.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\MI7L6.exe"C:\Users\Admin\AppData\Local\Temp\MI7L6.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\56577.exe"C:\Users\Admin\AppData\Local\Temp\56577.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\IRE01.exe"C:\Users\Admin\AppData\Local\Temp\IRE01.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\8QGN8.exe"C:\Users\Admin\AppData\Local\Temp\8QGN8.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\T59TB.exe"C:\Users\Admin\AppData\Local\Temp\T59TB.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\G3WOU.exe"C:\Users\Admin\AppData\Local\Temp\G3WOU.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\239MD.exe"C:\Users\Admin\AppData\Local\Temp\239MD.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\GVT3P.exe"C:\Users\Admin\AppData\Local\Temp\GVT3P.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\41Y5C.exe"C:\Users\Admin\AppData\Local\Temp\41Y5C.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\M3OO0.exe"C:\Users\Admin\AppData\Local\Temp\M3OO0.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\520L6.exe"C:\Users\Admin\AppData\Local\Temp\520L6.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\I24S3.exe"C:\Users\Admin\AppData\Local\Temp\I24S3.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\795TH.exe"C:\Users\Admin\AppData\Local\Temp\795TH.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\Z3B64.exe"C:\Users\Admin\AppData\Local\Temp\Z3B64.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:968 -
C:\Users\Admin\AppData\Local\Temp\9R80Z.exe"C:\Users\Admin\AppData\Local\Temp\9R80Z.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\8E267.exe"C:\Users\Admin\AppData\Local\Temp\8E267.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\Y3F6U.exe"C:\Users\Admin\AppData\Local\Temp\Y3F6U.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:936 -
C:\Users\Admin\AppData\Local\Temp\307UX.exe"C:\Users\Admin\AppData\Local\Temp\307UX.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\RN2W2.exe"C:\Users\Admin\AppData\Local\Temp\RN2W2.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\9T9GX.exe"C:\Users\Admin\AppData\Local\Temp\9T9GX.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\K778N.exe"C:\Users\Admin\AppData\Local\Temp\K778N.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\OHIS1.exe"C:\Users\Admin\AppData\Local\Temp\OHIS1.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\DCXFT.exe"C:\Users\Admin\AppData\Local\Temp\DCXFT.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\7EL9P.exe"C:\Users\Admin\AppData\Local\Temp\7EL9P.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\P2WI4.exe"C:\Users\Admin\AppData\Local\Temp\P2WI4.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\QZV8P.exe"C:\Users\Admin\AppData\Local\Temp\QZV8P.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\SYAZ3.exe"C:\Users\Admin\AppData\Local\Temp\SYAZ3.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\9BJ63.exe"C:\Users\Admin\AppData\Local\Temp\9BJ63.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\E9367.exe"C:\Users\Admin\AppData\Local\Temp\E9367.exe"33⤵
- Executes dropped EXE
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\0B3XS.exe"C:\Users\Admin\AppData\Local\Temp\0B3XS.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:576 -
C:\Users\Admin\AppData\Local\Temp\HI3H2.exe"C:\Users\Admin\AppData\Local\Temp\HI3H2.exe"35⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\V0OI7.exe"C:\Users\Admin\AppData\Local\Temp\V0OI7.exe"36⤵
- Executes dropped EXE
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\762KW.exe"C:\Users\Admin\AppData\Local\Temp\762KW.exe"37⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\17734.exe"C:\Users\Admin\AppData\Local\Temp\17734.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\0722E.exe"C:\Users\Admin\AppData\Local\Temp\0722E.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\76OFD.exe"C:\Users\Admin\AppData\Local\Temp\76OFD.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\RSZ41.exe"C:\Users\Admin\AppData\Local\Temp\RSZ41.exe"41⤵
- Executes dropped EXE
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\2OH27.exe"C:\Users\Admin\AppData\Local\Temp\2OH27.exe"42⤵
- Executes dropped EXE
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\N339N.exe"C:\Users\Admin\AppData\Local\Temp\N339N.exe"43⤵
- Executes dropped EXE
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\E74H9.exe"C:\Users\Admin\AppData\Local\Temp\E74H9.exe"44⤵
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\3X417.exe"C:\Users\Admin\AppData\Local\Temp\3X417.exe"45⤵
- Executes dropped EXE
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\0629U.exe"C:\Users\Admin\AppData\Local\Temp\0629U.exe"46⤵
- Executes dropped EXE
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\O3352.exe"C:\Users\Admin\AppData\Local\Temp\O3352.exe"47⤵
- Executes dropped EXE
PID:692 -
C:\Users\Admin\AppData\Local\Temp\3DG34.exe"C:\Users\Admin\AppData\Local\Temp\3DG34.exe"48⤵
- Executes dropped EXE
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\XTLQV.exe"C:\Users\Admin\AppData\Local\Temp\XTLQV.exe"49⤵
- Executes dropped EXE
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\7U3Z6.exe"C:\Users\Admin\AppData\Local\Temp\7U3Z6.exe"50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\MGPY7.exe"C:\Users\Admin\AppData\Local\Temp\MGPY7.exe"51⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\7KOSF.exe"C:\Users\Admin\AppData\Local\Temp\7KOSF.exe"52⤵
- Executes dropped EXE
PID:936 -
C:\Users\Admin\AppData\Local\Temp\OB5S7.exe"C:\Users\Admin\AppData\Local\Temp\OB5S7.exe"53⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\C03L3.exe"C:\Users\Admin\AppData\Local\Temp\C03L3.exe"54⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\V64CZ.exe"C:\Users\Admin\AppData\Local\Temp\V64CZ.exe"55⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\21XLM.exe"C:\Users\Admin\AppData\Local\Temp\21XLM.exe"56⤵
- Executes dropped EXE
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\58OE9.exe"C:\Users\Admin\AppData\Local\Temp\58OE9.exe"57⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\856DV.exe"C:\Users\Admin\AppData\Local\Temp\856DV.exe"58⤵
- Executes dropped EXE
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\V6H49.exe"C:\Users\Admin\AppData\Local\Temp\V6H49.exe"59⤵
- Executes dropped EXE
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\18731.exe"C:\Users\Admin\AppData\Local\Temp\18731.exe"60⤵
- Executes dropped EXE
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\U278T.exe"C:\Users\Admin\AppData\Local\Temp\U278T.exe"61⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\134U8.exe"C:\Users\Admin\AppData\Local\Temp\134U8.exe"62⤵
- Executes dropped EXE
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\3516P.exe"C:\Users\Admin\AppData\Local\Temp\3516P.exe"63⤵
- Executes dropped EXE
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\FX5NR.exe"C:\Users\Admin\AppData\Local\Temp\FX5NR.exe"64⤵
- Executes dropped EXE
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\94OH5.exe"C:\Users\Admin\AppData\Local\Temp\94OH5.exe"65⤵
- Executes dropped EXE
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\708D2.exe"C:\Users\Admin\AppData\Local\Temp\708D2.exe"66⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\YSDXV.exe"C:\Users\Admin\AppData\Local\Temp\YSDXV.exe"67⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\X51XI.exe"C:\Users\Admin\AppData\Local\Temp\X51XI.exe"68⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\12LQ2.exe"C:\Users\Admin\AppData\Local\Temp\12LQ2.exe"69⤵
- System Location Discovery: System Language Discovery
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\QB7KI.exe"C:\Users\Admin\AppData\Local\Temp\QB7KI.exe"70⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\557U4.exe"C:\Users\Admin\AppData\Local\Temp\557U4.exe"71⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\9Q817.exe"C:\Users\Admin\AppData\Local\Temp\9Q817.exe"72⤵
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\AC57N.exe"C:\Users\Admin\AppData\Local\Temp\AC57N.exe"73⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\B9637.exe"C:\Users\Admin\AppData\Local\Temp\B9637.exe"74⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\5SH28.exe"C:\Users\Admin\AppData\Local\Temp\5SH28.exe"75⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\0257H.exe"C:\Users\Admin\AppData\Local\Temp\0257H.exe"76⤵
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\06GM1.exe"C:\Users\Admin\AppData\Local\Temp\06GM1.exe"77⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\AIU02.exe"C:\Users\Admin\AppData\Local\Temp\AIU02.exe"78⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\3P99P.exe"C:\Users\Admin\AppData\Local\Temp\3P99P.exe"79⤵
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\2DGUZ.exe"C:\Users\Admin\AppData\Local\Temp\2DGUZ.exe"80⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Q18N7.exe"C:\Users\Admin\AppData\Local\Temp\Q18N7.exe"81⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\558FU.exe"C:\Users\Admin\AppData\Local\Temp\558FU.exe"82⤵
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\U7R86.exe"C:\Users\Admin\AppData\Local\Temp\U7R86.exe"83⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\X5MVV.exe"C:\Users\Admin\AppData\Local\Temp\X5MVV.exe"84⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\999G9.exe"C:\Users\Admin\AppData\Local\Temp\999G9.exe"85⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\6ZI7H.exe"C:\Users\Admin\AppData\Local\Temp\6ZI7H.exe"86⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\P6LHB.exe"C:\Users\Admin\AppData\Local\Temp\P6LHB.exe"87⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\F5TPI.exe"C:\Users\Admin\AppData\Local\Temp\F5TPI.exe"88⤵
- System Location Discovery: System Language Discovery
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\79B73.exe"C:\Users\Admin\AppData\Local\Temp\79B73.exe"89⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\7C54I.exe"C:\Users\Admin\AppData\Local\Temp\7C54I.exe"90⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\NW016.exe"C:\Users\Admin\AppData\Local\Temp\NW016.exe"91⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\2CXXA.exe"C:\Users\Admin\AppData\Local\Temp\2CXXA.exe"92⤵
- System Location Discovery: System Language Discovery
PID:988 -
C:\Users\Admin\AppData\Local\Temp\24B2N.exe"C:\Users\Admin\AppData\Local\Temp\24B2N.exe"93⤵
- System Location Discovery: System Language Discovery
PID:604 -
C:\Users\Admin\AppData\Local\Temp\8AMK5.exe"C:\Users\Admin\AppData\Local\Temp\8AMK5.exe"94⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\3450P.exe"C:\Users\Admin\AppData\Local\Temp\3450P.exe"95⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\57N7P.exe"C:\Users\Admin\AppData\Local\Temp\57N7P.exe"96⤵
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\WHYE4.exe"C:\Users\Admin\AppData\Local\Temp\WHYE4.exe"97⤵
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\Q4N67.exe"C:\Users\Admin\AppData\Local\Temp\Q4N67.exe"98⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\6P9XG.exe"C:\Users\Admin\AppData\Local\Temp\6P9XG.exe"99⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\UJ3X9.exe"C:\Users\Admin\AppData\Local\Temp\UJ3X9.exe"100⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\8265G.exe"C:\Users\Admin\AppData\Local\Temp\8265G.exe"101⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\0H911.exe"C:\Users\Admin\AppData\Local\Temp\0H911.exe"102⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\79G9W.exe"C:\Users\Admin\AppData\Local\Temp\79G9W.exe"103⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\ON83A.exe"C:\Users\Admin\AppData\Local\Temp\ON83A.exe"104⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\8TN19.exe"C:\Users\Admin\AppData\Local\Temp\8TN19.exe"105⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\94H84.exe"C:\Users\Admin\AppData\Local\Temp\94H84.exe"106⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\O8PHL.exe"C:\Users\Admin\AppData\Local\Temp\O8PHL.exe"107⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\3RJR1.exe"C:\Users\Admin\AppData\Local\Temp\3RJR1.exe"108⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\R155L.exe"C:\Users\Admin\AppData\Local\Temp\R155L.exe"109⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\NCEX4.exe"C:\Users\Admin\AppData\Local\Temp\NCEX4.exe"110⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\641IH.exe"C:\Users\Admin\AppData\Local\Temp\641IH.exe"111⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\1ES70.exe"C:\Users\Admin\AppData\Local\Temp\1ES70.exe"112⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\CM53J.exe"C:\Users\Admin\AppData\Local\Temp\CM53J.exe"113⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\514ZA.exe"C:\Users\Admin\AppData\Local\Temp\514ZA.exe"114⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\TNPK5.exe"C:\Users\Admin\AppData\Local\Temp\TNPK5.exe"115⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\UNMBO.exe"C:\Users\Admin\AppData\Local\Temp\UNMBO.exe"116⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\3H245.exe"C:\Users\Admin\AppData\Local\Temp\3H245.exe"117⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\LOW56.exe"C:\Users\Admin\AppData\Local\Temp\LOW56.exe"118⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\RW215.exe"C:\Users\Admin\AppData\Local\Temp\RW215.exe"119⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\2E309.exe"C:\Users\Admin\AppData\Local\Temp\2E309.exe"120⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\F7VST.exe"C:\Users\Admin\AppData\Local\Temp\F7VST.exe"121⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\L352I.exe"C:\Users\Admin\AppData\Local\Temp\L352I.exe"122⤵PID:952
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-