Analysis
-
max time kernel
85s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 18:03
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.205482aaa3fb5a04221884f4cf794220_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.205482aaa3fb5a04221884f4cf794220_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.205482aaa3fb5a04221884f4cf794220_JC.exe
-
Size
2.8MB
-
MD5
205482aaa3fb5a04221884f4cf794220
-
SHA1
19b0c915d73db58cf0f5a43eafad19aeeb914786
-
SHA256
10243f83234e3afe0ee66f36517b4e08869f27a4edc4e33a1141e31d78db3d4d
-
SHA512
b5b3d350d283fb2d4b2ae8ba436ca3858187405b57e7636221de7c781c7fe32125fd5ec451b5b9bc14a284d22bb9d6d0b025ba896588389580f9ec1c751f038c
-
SSDEEP
49152:tylFHUv6ReIt0jSrOogENXwu3qCqtKBjJj4B7hZIq7T94gcIFwxgo4:0lFHU85t0jS/gENAu6ChJjA7hZIq7T9T
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 59 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation HKPIU.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation P5R5M.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 2MQA5.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 3K90C.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation ENYU0.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation E2C6T.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation Q7QT0.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation TLXRQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation O10FV.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation Y9ETA.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 670D3.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation Z5204.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 93KA4.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation HDQR0.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 7390C.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 0218R.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation JYI8P.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 196Q2.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation Z6Y11.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 3OGB2.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 818BL.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation QD47Z.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation J3I2Y.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation L8XRP.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 1C27I.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation GDW5M.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 1F5CE.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation Q2KG0.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 3X42V.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation G294M.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 9NT6H.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 91UU8.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation W5C13.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation QU64I.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation VJ4T6.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation TJOAE.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 0GE2W.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 7F7EQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation NEAS.205482aaa3fb5a04221884f4cf794220_JC.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation O07M9.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation CS7Z6.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation MH9KM.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation IVKOC.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 0T46B.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 7V5ES.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation S0M74.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 6V35G.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 3UP85.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 3V4I9.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 178F2.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 8US6I.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 33EGU.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 8O1PY.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 702FO.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 316GY.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation AC91X.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation E983X.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 1R1YJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 5177U.exe -
Executes dropped EXE 60 IoCs
pid Process 4120 3V4I9.exe 4996 818BL.exe 4800 O07M9.exe 4744 Z5204.exe 2208 L8XRP.exe 1164 0T46B.exe 2152 VJ4T6.exe 2244 QD47Z.exe 2588 33EGU.exe 3716 6V35G.exe 2580 TLXRQ.exe 3800 0GE2W.exe 916 1R1YJ.exe 552 7V5ES.exe 4088 CS7Z6.exe 4696 G294M.exe 624 TJOAE.exe 1716 MH9KM.exe 2884 O10FV.exe 3984 7F7EQ.exe 1676 91UU8.exe 424 0218R.exe 4752 316GY.exe 5080 9NT6H.exe 252 W5C13.exe 4056 HDQR0.exe 1520 AC91X.exe 1388 7390C.exe 4100 93KA4.exe 1180 E2C6T.exe 3628 8O1PY.exe 764 QU64I.exe 116 3474B.exe 2340 JYI8P.exe 4888 IVKOC.exe 5012 3K90C.exe 4092 196Q2.exe 4276 Z6Y11.exe 1740 S0M74.exe 712 3OGB2.exe 2172 GDW5M.exe 5036 ENYU0.exe 2548 HKPIU.exe 908 1F5CE.exe 2140 K01CC.exe 808 J3I2Y.exe 4996 178F2.exe 60 3UP85.exe 4480 Q2KG0.exe 624 TJOAE.exe 2852 Y9ETA.exe 3796 P5R5M.exe 4824 E983X.exe 4984 670D3.exe 828 702FO.exe 4052 Q7QT0.exe 2080 3X42V.exe 2524 8US6I.exe 1892 2MQA5.exe 1148 A004T.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4536 NEAS.205482aaa3fb5a04221884f4cf794220_JC.exe 4536 NEAS.205482aaa3fb5a04221884f4cf794220_JC.exe 4120 3V4I9.exe 4120 3V4I9.exe 4996 818BL.exe 4996 818BL.exe 4800 O07M9.exe 4800 O07M9.exe 4744 Z5204.exe 4744 Z5204.exe 2208 L8XRP.exe 2208 L8XRP.exe 1164 0T46B.exe 1164 0T46B.exe 2152 VJ4T6.exe 2152 VJ4T6.exe 2244 QD47Z.exe 2244 QD47Z.exe 2588 33EGU.exe 2588 33EGU.exe 3716 6V35G.exe 3716 6V35G.exe 2580 TLXRQ.exe 2580 TLXRQ.exe 3800 0GE2W.exe 3800 0GE2W.exe 916 1R1YJ.exe 916 1R1YJ.exe 552 7V5ES.exe 552 7V5ES.exe 4088 CS7Z6.exe 4088 CS7Z6.exe 4696 G294M.exe 4696 G294M.exe 624 TJOAE.exe 624 TJOAE.exe 1716 MH9KM.exe 1716 MH9KM.exe 2884 O10FV.exe 2884 O10FV.exe 3984 7F7EQ.exe 3984 7F7EQ.exe 1676 91UU8.exe 1676 91UU8.exe 424 0218R.exe 424 0218R.exe 4752 316GY.exe 4752 316GY.exe 5080 9NT6H.exe 5080 9NT6H.exe 932 46Z4Q.exe 932 46Z4Q.exe 4056 HDQR0.exe 4056 HDQR0.exe 1520 AC91X.exe 1520 AC91X.exe 1388 7390C.exe 1388 7390C.exe 4100 93KA4.exe 4100 93KA4.exe 1180 E2C6T.exe 1180 E2C6T.exe 3628 8O1PY.exe 3628 8O1PY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4536 wrote to memory of 4120 4536 NEAS.205482aaa3fb5a04221884f4cf794220_JC.exe 90 PID 4536 wrote to memory of 4120 4536 NEAS.205482aaa3fb5a04221884f4cf794220_JC.exe 90 PID 4536 wrote to memory of 4120 4536 NEAS.205482aaa3fb5a04221884f4cf794220_JC.exe 90 PID 4120 wrote to memory of 4996 4120 3V4I9.exe 91 PID 4120 wrote to memory of 4996 4120 3V4I9.exe 91 PID 4120 wrote to memory of 4996 4120 3V4I9.exe 91 PID 4996 wrote to memory of 4800 4996 818BL.exe 92 PID 4996 wrote to memory of 4800 4996 818BL.exe 92 PID 4996 wrote to memory of 4800 4996 818BL.exe 92 PID 4800 wrote to memory of 4744 4800 O07M9.exe 93 PID 4800 wrote to memory of 4744 4800 O07M9.exe 93 PID 4800 wrote to memory of 4744 4800 O07M9.exe 93 PID 4744 wrote to memory of 2208 4744 Z5204.exe 95 PID 4744 wrote to memory of 2208 4744 Z5204.exe 95 PID 4744 wrote to memory of 2208 4744 Z5204.exe 95 PID 2208 wrote to memory of 1164 2208 L8XRP.exe 96 PID 2208 wrote to memory of 1164 2208 L8XRP.exe 96 PID 2208 wrote to memory of 1164 2208 L8XRP.exe 96 PID 1164 wrote to memory of 2152 1164 0T46B.exe 97 PID 1164 wrote to memory of 2152 1164 0T46B.exe 97 PID 1164 wrote to memory of 2152 1164 0T46B.exe 97 PID 2152 wrote to memory of 2244 2152 VJ4T6.exe 98 PID 2152 wrote to memory of 2244 2152 VJ4T6.exe 98 PID 2152 wrote to memory of 2244 2152 VJ4T6.exe 98 PID 2244 wrote to memory of 2588 2244 QD47Z.exe 99 PID 2244 wrote to memory of 2588 2244 QD47Z.exe 99 PID 2244 wrote to memory of 2588 2244 QD47Z.exe 99 PID 2588 wrote to memory of 3716 2588 33EGU.exe 100 PID 2588 wrote to memory of 3716 2588 33EGU.exe 100 PID 2588 wrote to memory of 3716 2588 33EGU.exe 100 PID 3716 wrote to memory of 2580 3716 6V35G.exe 101 PID 3716 wrote to memory of 2580 3716 6V35G.exe 101 PID 3716 wrote to memory of 2580 3716 6V35G.exe 101 PID 2580 wrote to memory of 3800 2580 TLXRQ.exe 102 PID 2580 wrote to memory of 3800 2580 TLXRQ.exe 102 PID 2580 wrote to memory of 3800 2580 TLXRQ.exe 102 PID 3800 wrote to memory of 916 3800 0GE2W.exe 105 PID 3800 wrote to memory of 916 3800 0GE2W.exe 105 PID 3800 wrote to memory of 916 3800 0GE2W.exe 105 PID 916 wrote to memory of 552 916 1R1YJ.exe 107 PID 916 wrote to memory of 552 916 1R1YJ.exe 107 PID 916 wrote to memory of 552 916 1R1YJ.exe 107 PID 552 wrote to memory of 4088 552 7V5ES.exe 108 PID 552 wrote to memory of 4088 552 7V5ES.exe 108 PID 552 wrote to memory of 4088 552 7V5ES.exe 108 PID 4088 wrote to memory of 4696 4088 CS7Z6.exe 109 PID 4088 wrote to memory of 4696 4088 CS7Z6.exe 109 PID 4088 wrote to memory of 4696 4088 CS7Z6.exe 109 PID 4696 wrote to memory of 624 4696 G294M.exe 147 PID 4696 wrote to memory of 624 4696 G294M.exe 147 PID 4696 wrote to memory of 624 4696 G294M.exe 147 PID 624 wrote to memory of 1716 624 TJOAE.exe 111 PID 624 wrote to memory of 1716 624 TJOAE.exe 111 PID 624 wrote to memory of 1716 624 TJOAE.exe 111 PID 1716 wrote to memory of 2884 1716 MH9KM.exe 113 PID 1716 wrote to memory of 2884 1716 MH9KM.exe 113 PID 1716 wrote to memory of 2884 1716 MH9KM.exe 113 PID 2884 wrote to memory of 3984 2884 O10FV.exe 114 PID 2884 wrote to memory of 3984 2884 O10FV.exe 114 PID 2884 wrote to memory of 3984 2884 O10FV.exe 114 PID 3984 wrote to memory of 1676 3984 7F7EQ.exe 115 PID 3984 wrote to memory of 1676 3984 7F7EQ.exe 115 PID 3984 wrote to memory of 1676 3984 7F7EQ.exe 115 PID 1676 wrote to memory of 424 1676 91UU8.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.205482aaa3fb5a04221884f4cf794220_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.205482aaa3fb5a04221884f4cf794220_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\3V4I9.exe"C:\Users\Admin\AppData\Local\Temp\3V4I9.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\818BL.exe"C:\Users\Admin\AppData\Local\Temp\818BL.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\O07M9.exe"C:\Users\Admin\AppData\Local\Temp\O07M9.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\Z5204.exe"C:\Users\Admin\AppData\Local\Temp\Z5204.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\L8XRP.exe"C:\Users\Admin\AppData\Local\Temp\L8XRP.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\0T46B.exe"C:\Users\Admin\AppData\Local\Temp\0T46B.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\VJ4T6.exe"C:\Users\Admin\AppData\Local\Temp\VJ4T6.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\QD47Z.exe"C:\Users\Admin\AppData\Local\Temp\QD47Z.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\33EGU.exe"C:\Users\Admin\AppData\Local\Temp\33EGU.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\6V35G.exe"C:\Users\Admin\AppData\Local\Temp\6V35G.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\TLXRQ.exe"C:\Users\Admin\AppData\Local\Temp\TLXRQ.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\0GE2W.exe"C:\Users\Admin\AppData\Local\Temp\0GE2W.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\1R1YJ.exe"C:\Users\Admin\AppData\Local\Temp\1R1YJ.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\7V5ES.exe"C:\Users\Admin\AppData\Local\Temp\7V5ES.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\CS7Z6.exe"C:\Users\Admin\AppData\Local\Temp\CS7Z6.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\G294M.exe"C:\Users\Admin\AppData\Local\Temp\G294M.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\2II17.exe"C:\Users\Admin\AppData\Local\Temp\2II17.exe"18⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\MH9KM.exe"C:\Users\Admin\AppData\Local\Temp\MH9KM.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\O10FV.exe"C:\Users\Admin\AppData\Local\Temp\O10FV.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\7F7EQ.exe"C:\Users\Admin\AppData\Local\Temp\7F7EQ.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\91UU8.exe"C:\Users\Admin\AppData\Local\Temp\91UU8.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\0218R.exe"C:\Users\Admin\AppData\Local\Temp\0218R.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:424 -
C:\Users\Admin\AppData\Local\Temp\316GY.exe"C:\Users\Admin\AppData\Local\Temp\316GY.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\9NT6H.exe"C:\Users\Admin\AppData\Local\Temp\9NT6H.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\W5C13.exe"C:\Users\Admin\AppData\Local\Temp\W5C13.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:252 -
C:\Users\Admin\AppData\Local\Temp\46Z4Q.exe"C:\Users\Admin\AppData\Local\Temp\46Z4Q.exe"27⤵
- Suspicious use of SetWindowsHookEx
PID:932 -
C:\Users\Admin\AppData\Local\Temp\H99H3.exe"C:\Users\Admin\AppData\Local\Temp\H99H3.exe"28⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\AC91X.exe"C:\Users\Admin\AppData\Local\Temp\AC91X.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\7390C.exe"C:\Users\Admin\AppData\Local\Temp\7390C.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\93KA4.exe"C:\Users\Admin\AppData\Local\Temp\93KA4.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\E2C6T.exe"C:\Users\Admin\AppData\Local\Temp\E2C6T.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\8O1PY.exe"C:\Users\Admin\AppData\Local\Temp\8O1PY.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\QU64I.exe"C:\Users\Admin\AppData\Local\Temp\QU64I.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\3474B.exe"C:\Users\Admin\AppData\Local\Temp\3474B.exe"35⤵
- Executes dropped EXE
PID:116 -
C:\Users\Admin\AppData\Local\Temp\JYI8P.exe"C:\Users\Admin\AppData\Local\Temp\JYI8P.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\0UHU2.exe"C:\Users\Admin\AppData\Local\Temp\0UHU2.exe"37⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\42J19.exe"C:\Users\Admin\AppData\Local\Temp\42J19.exe"38⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\196Q2.exe"C:\Users\Admin\AppData\Local\Temp\196Q2.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\Z6Y11.exe"C:\Users\Admin\AppData\Local\Temp\Z6Y11.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\S0M74.exe"C:\Users\Admin\AppData\Local\Temp\S0M74.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\3OGB2.exe"C:\Users\Admin\AppData\Local\Temp\3OGB2.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
PID:712 -
C:\Users\Admin\AppData\Local\Temp\GDW5M.exe"C:\Users\Admin\AppData\Local\Temp\GDW5M.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\ENYU0.exe"C:\Users\Admin\AppData\Local\Temp\ENYU0.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\HKPIU.exe"C:\Users\Admin\AppData\Local\Temp\HKPIU.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\1F5CE.exe"C:\Users\Admin\AppData\Local\Temp\1F5CE.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:908 -
C:\Users\Admin\AppData\Local\Temp\K01CC.exe"C:\Users\Admin\AppData\Local\Temp\K01CC.exe"47⤵
- Executes dropped EXE
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\J3I2Y.exe"C:\Users\Admin\AppData\Local\Temp\J3I2Y.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:808 -
C:\Users\Admin\AppData\Local\Temp\178F2.exe"C:\Users\Admin\AppData\Local\Temp\178F2.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\I38Y3.exe"C:\Users\Admin\AppData\Local\Temp\I38Y3.exe"50⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\Q2KG0.exe"C:\Users\Admin\AppData\Local\Temp\Q2KG0.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\TJOAE.exe"C:\Users\Admin\AppData\Local\Temp\TJOAE.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\Y9ETA.exe"C:\Users\Admin\AppData\Local\Temp\Y9ETA.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\155YD.exe"C:\Users\Admin\AppData\Local\Temp\155YD.exe"54⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\E983X.exe"C:\Users\Admin\AppData\Local\Temp\E983X.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\670D3.exe"C:\Users\Admin\AppData\Local\Temp\670D3.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\702FO.exe"C:\Users\Admin\AppData\Local\Temp\702FO.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:828 -
C:\Users\Admin\AppData\Local\Temp\6YIB6.exe"C:\Users\Admin\AppData\Local\Temp\6YIB6.exe"58⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\3X42V.exe"C:\Users\Admin\AppData\Local\Temp\3X42V.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\8US6I.exe"C:\Users\Admin\AppData\Local\Temp\8US6I.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\2MQA5.exe"C:\Users\Admin\AppData\Local\Temp\2MQA5.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\A004T.exe"C:\Users\Admin\AppData\Local\Temp\A004T.exe"62⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\15L5F.exe"C:\Users\Admin\AppData\Local\Temp\15L5F.exe"63⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\928EW.exe"C:\Users\Admin\AppData\Local\Temp\928EW.exe"64⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\QNH3J.exe"C:\Users\Admin\AppData\Local\Temp\QNH3J.exe"65⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\B3OP0.exe"C:\Users\Admin\AppData\Local\Temp\B3OP0.exe"66⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\N1X8E.exe"C:\Users\Admin\AppData\Local\Temp\N1X8E.exe"67⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\EU1FP.exe"C:\Users\Admin\AppData\Local\Temp\EU1FP.exe"68⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\0DK32.exe"C:\Users\Admin\AppData\Local\Temp\0DK32.exe"69⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\5Z216.exe"C:\Users\Admin\AppData\Local\Temp\5Z216.exe"70⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\GDZ51.exe"C:\Users\Admin\AppData\Local\Temp\GDZ51.exe"71⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\MX1HD.exe"C:\Users\Admin\AppData\Local\Temp\MX1HD.exe"72⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\4P915.exe"C:\Users\Admin\AppData\Local\Temp\4P915.exe"73⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\13XC9.exe"C:\Users\Admin\AppData\Local\Temp\13XC9.exe"74⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\0D0BC.exe"C:\Users\Admin\AppData\Local\Temp\0D0BC.exe"75⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\5QR0Z.exe"C:\Users\Admin\AppData\Local\Temp\5QR0Z.exe"76⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\1O787.exe"C:\Users\Admin\AppData\Local\Temp\1O787.exe"77⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\9C466.exe"C:\Users\Admin\AppData\Local\Temp\9C466.exe"78⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\VD9P2.exe"C:\Users\Admin\AppData\Local\Temp\VD9P2.exe"79⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\E3658.exe"C:\Users\Admin\AppData\Local\Temp\E3658.exe"80⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\N9573.exe"C:\Users\Admin\AppData\Local\Temp\N9573.exe"81⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\90ZNK.exe"C:\Users\Admin\AppData\Local\Temp\90ZNK.exe"82⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\K0S0T.exe"C:\Users\Admin\AppData\Local\Temp\K0S0T.exe"83⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\T5XU0.exe"C:\Users\Admin\AppData\Local\Temp\T5XU0.exe"84⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\18DI1.exe"C:\Users\Admin\AppData\Local\Temp\18DI1.exe"85⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\F8V13.exe"C:\Users\Admin\AppData\Local\Temp\F8V13.exe"86⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\KNFCL.exe"C:\Users\Admin\AppData\Local\Temp\KNFCL.exe"87⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\3HBZH.exe"C:\Users\Admin\AppData\Local\Temp\3HBZH.exe"88⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\O264D.exe"C:\Users\Admin\AppData\Local\Temp\O264D.exe"89⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\7Z8VM.exe"C:\Users\Admin\AppData\Local\Temp\7Z8VM.exe"90⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\I34BA.exe"C:\Users\Admin\AppData\Local\Temp\I34BA.exe"91⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\7ETDO.exe"C:\Users\Admin\AppData\Local\Temp\7ETDO.exe"92⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\QGH4S.exe"C:\Users\Admin\AppData\Local\Temp\QGH4S.exe"93⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\AADPN.exe"C:\Users\Admin\AppData\Local\Temp\AADPN.exe"94⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\6CRDR.exe"C:\Users\Admin\AppData\Local\Temp\6CRDR.exe"95⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\3K90C.exe"C:\Users\Admin\AppData\Local\Temp\3K90C.exe"96⤵
- Checks computer location settings
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\ZM3N3.exe"C:\Users\Admin\AppData\Local\Temp\ZM3N3.exe"97⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\T2268.exe"C:\Users\Admin\AppData\Local\Temp\T2268.exe"98⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\88788.exe"C:\Users\Admin\AppData\Local\Temp\88788.exe"99⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\2N7H5.exe"C:\Users\Admin\AppData\Local\Temp\2N7H5.exe"100⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\7S379.exe"C:\Users\Admin\AppData\Local\Temp\7S379.exe"101⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\HDQR0.exe"C:\Users\Admin\AppData\Local\Temp\HDQR0.exe"102⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\1FD46.exe"C:\Users\Admin\AppData\Local\Temp\1FD46.exe"103⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\30S37.exe"C:\Users\Admin\AppData\Local\Temp\30S37.exe"104⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\VVQQ0.exe"C:\Users\Admin\AppData\Local\Temp\VVQQ0.exe"105⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\4UQ7X.exe"C:\Users\Admin\AppData\Local\Temp\4UQ7X.exe"106⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\J62UL.exe"C:\Users\Admin\AppData\Local\Temp\J62UL.exe"107⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\86XK5.exe"C:\Users\Admin\AppData\Local\Temp\86XK5.exe"108⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\VW126.exe"C:\Users\Admin\AppData\Local\Temp\VW126.exe"109⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\3EW10.exe"C:\Users\Admin\AppData\Local\Temp\3EW10.exe"110⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\1S0B9.exe"C:\Users\Admin\AppData\Local\Temp\1S0B9.exe"111⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\36NX6.exe"C:\Users\Admin\AppData\Local\Temp\36NX6.exe"112⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\D7I14.exe"C:\Users\Admin\AppData\Local\Temp\D7I14.exe"113⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\IO976.exe"C:\Users\Admin\AppData\Local\Temp\IO976.exe"114⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\IVKOC.exe"C:\Users\Admin\AppData\Local\Temp\IVKOC.exe"115⤵
- Checks computer location settings
- Executes dropped EXE
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\C875Q.exe"C:\Users\Admin\AppData\Local\Temp\C875Q.exe"116⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\F45QO.exe"C:\Users\Admin\AppData\Local\Temp\F45QO.exe"117⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\F47GQ.exe"C:\Users\Admin\AppData\Local\Temp\F47GQ.exe"118⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\R840M.exe"C:\Users\Admin\AppData\Local\Temp\R840M.exe"119⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\2EVR4.exe"C:\Users\Admin\AppData\Local\Temp\2EVR4.exe"120⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\Y5E47.exe"C:\Users\Admin\AppData\Local\Temp\Y5E47.exe"121⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\18SIV.exe"C:\Users\Admin\AppData\Local\Temp\18SIV.exe"122⤵PID:1988
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-