Analysis
-
max time kernel
79s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2023 21:07
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6f3e228d40ff95b916683d53ee67c6b0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.6f3e228d40ff95b916683d53ee67c6b0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.6f3e228d40ff95b916683d53ee67c6b0.exe
-
Size
1.2MB
-
MD5
6f3e228d40ff95b916683d53ee67c6b0
-
SHA1
fcb9aaccb2a8485fc4e1c671cecd4ac60e7a7211
-
SHA256
b84b7bb27dad875e2d970715138236501a998ccb10de2a10c4266da087129a5d
-
SHA512
3d2765c525b6f5d354c85220f6fe2a71c1723153002a5a01eadd6b75914d6924f2456b1bd850e49a0dd067569c635fa254dca344f4f042ee6552540b223ceb12
-
SSDEEP
24576:1qylFH50Dv6RwyeQvt6ot0h9HyrONiruAI:IylFHUv6ReIt0jSrOh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation OYL9H.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 4F2JC.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation D4EGZ.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation L8I9Z.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 5E1GA.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 4M7RN.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation KX326.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation TUARI.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 998U8.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 35H9F.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 91GER.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation RS98M.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 15494.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation I28A3.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 87CZW.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation NEAS.6f3e228d40ff95b916683d53ee67c6b0.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation T862I.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 0ENA7.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 9E2O2.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation R2PN4.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 4P26S.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 4XR16.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation E8DRN.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 9A761.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 878JM.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 2R884.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 5NS5E.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 6NU30.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Y3W35.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 5V051.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 7VS7G.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 4195E.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 4DDWJ.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation WT978.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation EBM67.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 9356X.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation L565J.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation U2K7W.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 04HVC.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 0UHU2.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation QNH3J.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation U88Q3.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Q33K8.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 52C43.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation BN1A2.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 3R3N3.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation IZJ8E.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 24F39.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 7S15Z.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 6Z026.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 66E30.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation IYV8W.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation L6680.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation NTXYP.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 9KX1V.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation FGYGO.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 2BYP3.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation N664B.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 4987G.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation UL234.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 578MZ.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 44851.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation NF440.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 4YY0C.exe -
Executes dropped EXE 64 IoCs
pid Process 2124 22O9J.exe 1408 KX326.exe 4216 15494.exe 1604 9E2O2.exe 3480 D4EGZ.exe 816 ZR9V2.exe 1500 7ON9V.exe 4528 79E1K.exe 3852 4YY0C.exe 5020 E4511.exe 640 6Z026.exe 3076 4DDWJ.exe 452 9A761.exe 2116 C36K3.exe 2216 N56LT.exe 2364 35H9F.exe 5112 52C43.exe 3428 91GER.exe 5008 LO226.exe 816 ZR9V2.exe 900 674WX.exe 776 Y3W35.exe 3008 BN1A2.exe 2412 NNQ79.exe 4368 9KX1V.exe 400 U2K7W.exe 3064 6ZSWJ.exe 4940 I28A3.exe 4660 IZJ8E.exe 1704 L8I9Z.exe 1812 T862I.exe 4208 I2106.exe 1596 04HVC.exe 4280 1NIV3.exe 844 66E30.exe 5032 IQ9L9.exe 740 55P11.exe 3400 TA0SR.exe 2612 878JM.exe 1692 M4XE5.exe 4256 D00CH.exe 4020 R2PN4.exe 4032 O194Z.exe 2916 4P26S.exe 3684 1R5ZS.exe 4960 PDR3K.exe 5112 5V051.exe 960 OYL9H.exe 3428 WT978.exe 4208 I2106.exe 4212 RS98M.exe 412 2R884.exe 4952 24F39.exe 4124 1IXB5.exe 3988 4F2JC.exe 3404 9X392.exe 3436 7VS7G.exe 2196 0ENA7.exe 5096 FGYGO.exe 4724 993Q3.exe 2220 7S15Z.exe 4984 JFEGQ.exe 2364 1W24L.exe 1544 5E1GA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2220 NEAS.6f3e228d40ff95b916683d53ee67c6b0.exe 2220 NEAS.6f3e228d40ff95b916683d53ee67c6b0.exe 2124 22O9J.exe 2124 22O9J.exe 1408 KX326.exe 1408 KX326.exe 4216 15494.exe 4216 15494.exe 1604 9E2O2.exe 1604 9E2O2.exe 3480 D4EGZ.exe 3480 D4EGZ.exe 816 ZR9V2.exe 816 ZR9V2.exe 1500 7ON9V.exe 1500 7ON9V.exe 4528 79E1K.exe 4528 79E1K.exe 3852 4YY0C.exe 3852 4YY0C.exe 5020 E4511.exe 5020 E4511.exe 640 6Z026.exe 640 6Z026.exe 3076 4DDWJ.exe 3076 4DDWJ.exe 452 9A761.exe 452 9A761.exe 2116 C36K3.exe 2116 C36K3.exe 2216 N56LT.exe 2216 N56LT.exe 2364 35H9F.exe 2364 35H9F.exe 5112 52C43.exe 5112 52C43.exe 3428 91GER.exe 3428 91GER.exe 5008 LO226.exe 5008 LO226.exe 816 ZR9V2.exe 816 ZR9V2.exe 900 674WX.exe 900 674WX.exe 776 Y3W35.exe 776 Y3W35.exe 3008 BN1A2.exe 3008 BN1A2.exe 2412 NNQ79.exe 2412 NNQ79.exe 4368 9KX1V.exe 4368 9KX1V.exe 2924 W8CO8.exe 2924 W8CO8.exe 3064 6ZSWJ.exe 3064 6ZSWJ.exe 4940 I28A3.exe 4940 I28A3.exe 4660 IZJ8E.exe 4660 IZJ8E.exe 1704 L8I9Z.exe 1704 L8I9Z.exe 1812 T862I.exe 1812 T862I.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2124 2220 NEAS.6f3e228d40ff95b916683d53ee67c6b0.exe 86 PID 2220 wrote to memory of 2124 2220 NEAS.6f3e228d40ff95b916683d53ee67c6b0.exe 86 PID 2220 wrote to memory of 2124 2220 NEAS.6f3e228d40ff95b916683d53ee67c6b0.exe 86 PID 2124 wrote to memory of 1408 2124 22O9J.exe 87 PID 2124 wrote to memory of 1408 2124 22O9J.exe 87 PID 2124 wrote to memory of 1408 2124 22O9J.exe 87 PID 1408 wrote to memory of 4216 1408 KX326.exe 89 PID 1408 wrote to memory of 4216 1408 KX326.exe 89 PID 1408 wrote to memory of 4216 1408 KX326.exe 89 PID 4216 wrote to memory of 1604 4216 15494.exe 90 PID 4216 wrote to memory of 1604 4216 15494.exe 90 PID 4216 wrote to memory of 1604 4216 15494.exe 90 PID 1604 wrote to memory of 3480 1604 9E2O2.exe 93 PID 1604 wrote to memory of 3480 1604 9E2O2.exe 93 PID 1604 wrote to memory of 3480 1604 9E2O2.exe 93 PID 3480 wrote to memory of 816 3480 D4EGZ.exe 113 PID 3480 wrote to memory of 816 3480 D4EGZ.exe 113 PID 3480 wrote to memory of 816 3480 D4EGZ.exe 113 PID 816 wrote to memory of 1500 816 ZR9V2.exe 96 PID 816 wrote to memory of 1500 816 ZR9V2.exe 96 PID 816 wrote to memory of 1500 816 ZR9V2.exe 96 PID 1500 wrote to memory of 4528 1500 7ON9V.exe 98 PID 1500 wrote to memory of 4528 1500 7ON9V.exe 98 PID 1500 wrote to memory of 4528 1500 7ON9V.exe 98 PID 4528 wrote to memory of 3852 4528 79E1K.exe 99 PID 4528 wrote to memory of 3852 4528 79E1K.exe 99 PID 4528 wrote to memory of 3852 4528 79E1K.exe 99 PID 3852 wrote to memory of 5020 3852 4YY0C.exe 100 PID 3852 wrote to memory of 5020 3852 4YY0C.exe 100 PID 3852 wrote to memory of 5020 3852 4YY0C.exe 100 PID 5020 wrote to memory of 640 5020 E4511.exe 102 PID 5020 wrote to memory of 640 5020 E4511.exe 102 PID 5020 wrote to memory of 640 5020 E4511.exe 102 PID 640 wrote to memory of 3076 640 6Z026.exe 103 PID 640 wrote to memory of 3076 640 6Z026.exe 103 PID 640 wrote to memory of 3076 640 6Z026.exe 103 PID 3076 wrote to memory of 452 3076 4DDWJ.exe 104 PID 3076 wrote to memory of 452 3076 4DDWJ.exe 104 PID 3076 wrote to memory of 452 3076 4DDWJ.exe 104 PID 452 wrote to memory of 2116 452 9A761.exe 105 PID 452 wrote to memory of 2116 452 9A761.exe 105 PID 452 wrote to memory of 2116 452 9A761.exe 105 PID 2116 wrote to memory of 2216 2116 C36K3.exe 106 PID 2116 wrote to memory of 2216 2116 C36K3.exe 106 PID 2116 wrote to memory of 2216 2116 C36K3.exe 106 PID 2216 wrote to memory of 2364 2216 N56LT.exe 109 PID 2216 wrote to memory of 2364 2216 N56LT.exe 109 PID 2216 wrote to memory of 2364 2216 N56LT.exe 109 PID 2364 wrote to memory of 5112 2364 35H9F.exe 110 PID 2364 wrote to memory of 5112 2364 35H9F.exe 110 PID 2364 wrote to memory of 5112 2364 35H9F.exe 110 PID 5112 wrote to memory of 3428 5112 52C43.exe 111 PID 5112 wrote to memory of 3428 5112 52C43.exe 111 PID 5112 wrote to memory of 3428 5112 52C43.exe 111 PID 3428 wrote to memory of 5008 3428 91GER.exe 112 PID 3428 wrote to memory of 5008 3428 91GER.exe 112 PID 3428 wrote to memory of 5008 3428 91GER.exe 112 PID 5008 wrote to memory of 816 5008 LO226.exe 113 PID 5008 wrote to memory of 816 5008 LO226.exe 113 PID 5008 wrote to memory of 816 5008 LO226.exe 113 PID 816 wrote to memory of 900 816 ZR9V2.exe 114 PID 816 wrote to memory of 900 816 ZR9V2.exe 114 PID 816 wrote to memory of 900 816 ZR9V2.exe 114 PID 900 wrote to memory of 776 900 674WX.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6f3e228d40ff95b916683d53ee67c6b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6f3e228d40ff95b916683d53ee67c6b0.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\22O9J.exe"C:\Users\Admin\AppData\Local\Temp\22O9J.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\KX326.exe"C:\Users\Admin\AppData\Local\Temp\KX326.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\15494.exe"C:\Users\Admin\AppData\Local\Temp\15494.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\9E2O2.exe"C:\Users\Admin\AppData\Local\Temp\9E2O2.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\D4EGZ.exe"C:\Users\Admin\AppData\Local\Temp\D4EGZ.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\B09Q3.exe"C:\Users\Admin\AppData\Local\Temp\B09Q3.exe"7⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\7ON9V.exe"C:\Users\Admin\AppData\Local\Temp\7ON9V.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\79E1K.exe"C:\Users\Admin\AppData\Local\Temp\79E1K.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\4YY0C.exe"C:\Users\Admin\AppData\Local\Temp\4YY0C.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\E4511.exe"C:\Users\Admin\AppData\Local\Temp\E4511.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\6Z026.exe"C:\Users\Admin\AppData\Local\Temp\6Z026.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\4DDWJ.exe"C:\Users\Admin\AppData\Local\Temp\4DDWJ.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\9A761.exe"C:\Users\Admin\AppData\Local\Temp\9A761.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\C36K3.exe"C:\Users\Admin\AppData\Local\Temp\C36K3.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\N56LT.exe"C:\Users\Admin\AppData\Local\Temp\N56LT.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\35H9F.exe"C:\Users\Admin\AppData\Local\Temp\35H9F.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\52C43.exe"C:\Users\Admin\AppData\Local\Temp\52C43.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\91GER.exe"C:\Users\Admin\AppData\Local\Temp\91GER.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\LO226.exe"C:\Users\Admin\AppData\Local\Temp\LO226.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\ZR9V2.exe"C:\Users\Admin\AppData\Local\Temp\ZR9V2.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\674WX.exe"C:\Users\Admin\AppData\Local\Temp\674WX.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\Y3W35.exe"C:\Users\Admin\AppData\Local\Temp\Y3W35.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:776 -
C:\Users\Admin\AppData\Local\Temp\BN1A2.exe"C:\Users\Admin\AppData\Local\Temp\BN1A2.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\NNQ79.exe"C:\Users\Admin\AppData\Local\Temp\NNQ79.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\9KX1V.exe"C:\Users\Admin\AppData\Local\Temp\9KX1V.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\U2K7W.exe"C:\Users\Admin\AppData\Local\Temp\U2K7W.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\W8CO8.exe"C:\Users\Admin\AppData\Local\Temp\W8CO8.exe"28⤵
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\6ZSWJ.exe"C:\Users\Admin\AppData\Local\Temp\6ZSWJ.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\I28A3.exe"C:\Users\Admin\AppData\Local\Temp\I28A3.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IZJ8E.exe"C:\Users\Admin\AppData\Local\Temp\IZJ8E.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\L8I9Z.exe"C:\Users\Admin\AppData\Local\Temp\L8I9Z.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\T862I.exe"C:\Users\Admin\AppData\Local\Temp\T862I.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\ER2LI.exe"C:\Users\Admin\AppData\Local\Temp\ER2LI.exe"34⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\04HVC.exe"C:\Users\Admin\AppData\Local\Temp\04HVC.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\1NIV3.exe"C:\Users\Admin\AppData\Local\Temp\1NIV3.exe"36⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\66E30.exe"C:\Users\Admin\AppData\Local\Temp\66E30.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:844 -
C:\Users\Admin\AppData\Local\Temp\IQ9L9.exe"C:\Users\Admin\AppData\Local\Temp\IQ9L9.exe"38⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\55P11.exe"C:\Users\Admin\AppData\Local\Temp\55P11.exe"39⤵
- Executes dropped EXE
PID:740 -
C:\Users\Admin\AppData\Local\Temp\TA0SR.exe"C:\Users\Admin\AppData\Local\Temp\TA0SR.exe"40⤵
- Executes dropped EXE
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\878JM.exe"C:\Users\Admin\AppData\Local\Temp\878JM.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\M4XE5.exe"C:\Users\Admin\AppData\Local\Temp\M4XE5.exe"42⤵
- Executes dropped EXE
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\D00CH.exe"C:\Users\Admin\AppData\Local\Temp\D00CH.exe"43⤵
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\R2PN4.exe"C:\Users\Admin\AppData\Local\Temp\R2PN4.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\3E6NK.exe"C:\Users\Admin\AppData\Local\Temp\3E6NK.exe"45⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\4P26S.exe"C:\Users\Admin\AppData\Local\Temp\4P26S.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\1R5ZS.exe"C:\Users\Admin\AppData\Local\Temp\1R5ZS.exe"47⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\PDR3K.exe"C:\Users\Admin\AppData\Local\Temp\PDR3K.exe"48⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\5V051.exe"C:\Users\Admin\AppData\Local\Temp\5V051.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\OYL9H.exe"C:\Users\Admin\AppData\Local\Temp\OYL9H.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:960 -
C:\Users\Admin\AppData\Local\Temp\38C43.exe"C:\Users\Admin\AppData\Local\Temp\38C43.exe"51⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\I2106.exe"C:\Users\Admin\AppData\Local\Temp\I2106.exe"52⤵
- Executes dropped EXE
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\M314U.exe"C:\Users\Admin\AppData\Local\Temp\M314U.exe"53⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\2R884.exe"C:\Users\Admin\AppData\Local\Temp\2R884.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:412 -
C:\Users\Admin\AppData\Local\Temp\24F39.exe"C:\Users\Admin\AppData\Local\Temp\24F39.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\1IXB5.exe"C:\Users\Admin\AppData\Local\Temp\1IXB5.exe"56⤵
- Executes dropped EXE
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\4F2JC.exe"C:\Users\Admin\AppData\Local\Temp\4F2JC.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\4300C.exe"C:\Users\Admin\AppData\Local\Temp\4300C.exe"58⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\2T7Q9.exe"C:\Users\Admin\AppData\Local\Temp\2T7Q9.exe"59⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\0ENA7.exe"C:\Users\Admin\AppData\Local\Temp\0ENA7.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\FGYGO.exe"C:\Users\Admin\AppData\Local\Temp\FGYGO.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\993Q3.exe"C:\Users\Admin\AppData\Local\Temp\993Q3.exe"62⤵
- Executes dropped EXE
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\7S15Z.exe"C:\Users\Admin\AppData\Local\Temp\7S15Z.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\JFEGQ.exe"C:\Users\Admin\AppData\Local\Temp\JFEGQ.exe"64⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\1W24L.exe"C:\Users\Admin\AppData\Local\Temp\1W24L.exe"65⤵
- Executes dropped EXE
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\P2VN2.exe"C:\Users\Admin\AppData\Local\Temp\P2VN2.exe"66⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\TUARI.exe"C:\Users\Admin\AppData\Local\Temp\TUARI.exe"67⤵
- Checks computer location settings
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\V8O50.exe"C:\Users\Admin\AppData\Local\Temp\V8O50.exe"68⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\0UHU2.exe"C:\Users\Admin\AppData\Local\Temp\0UHU2.exe"69⤵
- Checks computer location settings
PID:396 -
C:\Users\Admin\AppData\Local\Temp\4987G.exe"C:\Users\Admin\AppData\Local\Temp\4987G.exe"70⤵
- Checks computer location settings
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\F85I4.exe"C:\Users\Admin\AppData\Local\Temp\F85I4.exe"71⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\UL234.exe"C:\Users\Admin\AppData\Local\Temp\UL234.exe"72⤵
- Checks computer location settings
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\NTXYP.exe"C:\Users\Admin\AppData\Local\Temp\NTXYP.exe"73⤵
- Checks computer location settings
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\13C53.exe"C:\Users\Admin\AppData\Local\Temp\13C53.exe"74⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\3F64Z.exe"C:\Users\Admin\AppData\Local\Temp\3F64Z.exe"75⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\ROP6T.exe"C:\Users\Admin\AppData\Local\Temp\ROP6T.exe"76⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\4M7RN.exe"C:\Users\Admin\AppData\Local\Temp\4M7RN.exe"77⤵
- Checks computer location settings
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\910E1.exe"C:\Users\Admin\AppData\Local\Temp\910E1.exe"78⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\61664.exe"C:\Users\Admin\AppData\Local\Temp\61664.exe"79⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\U01PP.exe"C:\Users\Admin\AppData\Local\Temp\U01PP.exe"80⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\WT978.exe"C:\Users\Admin\AppData\Local\Temp\WT978.exe"81⤵
- Checks computer location settings
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\3R3N3.exe"C:\Users\Admin\AppData\Local\Temp\3R3N3.exe"82⤵
- Checks computer location settings
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\87CZW.exe"C:\Users\Admin\AppData\Local\Temp\87CZW.exe"83⤵
- Checks computer location settings
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\IYV8W.exe"C:\Users\Admin\AppData\Local\Temp\IYV8W.exe"84⤵
- Checks computer location settings
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\T7UR2.exe"C:\Users\Admin\AppData\Local\Temp\T7UR2.exe"85⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\X999P.exe"C:\Users\Admin\AppData\Local\Temp\X999P.exe"86⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\EBM67.exe"C:\Users\Admin\AppData\Local\Temp\EBM67.exe"87⤵
- Checks computer location settings
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\5RZ22.exe"C:\Users\Admin\AppData\Local\Temp\5RZ22.exe"88⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\F67J8.exe"C:\Users\Admin\AppData\Local\Temp\F67J8.exe"89⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\O194Z.exe"C:\Users\Admin\AppData\Local\Temp\O194Z.exe"90⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\578MZ.exe"C:\Users\Admin\AppData\Local\Temp\578MZ.exe"91⤵
- Checks computer location settings
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\9356X.exe"C:\Users\Admin\AppData\Local\Temp\9356X.exe"92⤵
- Checks computer location settings
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\44851.exe"C:\Users\Admin\AppData\Local\Temp\44851.exe"93⤵
- Checks computer location settings
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\6NU30.exe"C:\Users\Admin\AppData\Local\Temp\6NU30.exe"94⤵
- Checks computer location settings
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\H3ZQ8.exe"C:\Users\Admin\AppData\Local\Temp\H3ZQ8.exe"95⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\2BYP3.exe"C:\Users\Admin\AppData\Local\Temp\2BYP3.exe"96⤵
- Checks computer location settings
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\M1Y14.exe"C:\Users\Admin\AppData\Local\Temp\M1Y14.exe"97⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\L6680.exe"C:\Users\Admin\AppData\Local\Temp\L6680.exe"98⤵
- Checks computer location settings
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\QNH3J.exe"C:\Users\Admin\AppData\Local\Temp\QNH3J.exe"99⤵
- Checks computer location settings
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\998U8.exe"C:\Users\Admin\AppData\Local\Temp\998U8.exe"100⤵
- Checks computer location settings
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\VI0XV.exe"C:\Users\Admin\AppData\Local\Temp\VI0XV.exe"101⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\MUDVF.exe"C:\Users\Admin\AppData\Local\Temp\MUDVF.exe"102⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\E8DRN.exe"C:\Users\Admin\AppData\Local\Temp\E8DRN.exe"103⤵
- Checks computer location settings
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\N664B.exe"C:\Users\Admin\AppData\Local\Temp\N664B.exe"104⤵
- Checks computer location settings
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\U88Q3.exe"C:\Users\Admin\AppData\Local\Temp\U88Q3.exe"105⤵
- Checks computer location settings
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\O6564.exe"C:\Users\Admin\AppData\Local\Temp\O6564.exe"106⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\5C4XG.exe"C:\Users\Admin\AppData\Local\Temp\5C4XG.exe"107⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\NF440.exe"C:\Users\Admin\AppData\Local\Temp\NF440.exe"108⤵
- Checks computer location settings
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\6RY0I.exe"C:\Users\Admin\AppData\Local\Temp\6RY0I.exe"109⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\0FD9T.exe"C:\Users\Admin\AppData\Local\Temp\0FD9T.exe"110⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\Q33K8.exe"C:\Users\Admin\AppData\Local\Temp\Q33K8.exe"111⤵
- Checks computer location settings
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\18B42.exe"C:\Users\Admin\AppData\Local\Temp\18B42.exe"112⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\RQZFY.exe"C:\Users\Admin\AppData\Local\Temp\RQZFY.exe"113⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\892ZI.exe"C:\Users\Admin\AppData\Local\Temp\892ZI.exe"114⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\5C0A0.exe"C:\Users\Admin\AppData\Local\Temp\5C0A0.exe"115⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\B7O43.exe"C:\Users\Admin\AppData\Local\Temp\B7O43.exe"116⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\RS98M.exe"C:\Users\Admin\AppData\Local\Temp\RS98M.exe"117⤵
- Checks computer location settings
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\J9EW9.exe"C:\Users\Admin\AppData\Local\Temp\J9EW9.exe"118⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\B667C.exe"C:\Users\Admin\AppData\Local\Temp\B667C.exe"119⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\9X392.exe"C:\Users\Admin\AppData\Local\Temp\9X392.exe"120⤵
- Executes dropped EXE
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\26Y2V.exe"C:\Users\Admin\AppData\Local\Temp\26Y2V.exe"121⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\4KTJ7.exe"C:\Users\Admin\AppData\Local\Temp\4KTJ7.exe"122⤵PID:1460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-