Analysis
-
max time kernel
143s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 11:56
Static task
static1
Behavioral task
behavioral1
Sample
2c2c53d0e3c1390f698b90937bed8900_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2c2c53d0e3c1390f698b90937bed8900_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2c2c53d0e3c1390f698b90937bed8900_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
2c2c53d0e3c1390f698b90937bed8900
-
SHA1
826e781b4e239edc2b4b9a7993eb60594bfa7e88
-
SHA256
99f077bfa9d0aaf86eb0ef604e101f1032c3e7c980295db6f068aa100e91bd45
-
SHA512
82b4ed7ac116f0897809e50cb1a4f3c281d7c49b08ca10899738f4f449d8c3a2d27333c0f1bbe34889491cfe773fd12d474dcf088e10ba8d254cce2d784d4701
-
SSDEEP
24576:1qylFH50Dv6RwyeQvt6ot0h9HyrOgiruA9:IylFHUv6ReIt0jSrOL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 0LBIM.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 0HXH5.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 4OM67.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation WRKHK.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 46AI7.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation JFWIB.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation B4T17.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 25R0W.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation U89FL.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation K62B1.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 8P3V1.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation G9R56.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 9X6HR.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation U7GAV.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation S1500.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 82U6P.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation G781N.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation NT276.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation K1K38.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 47CMP.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 6RJJ3.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation LC0GX.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 3JCC9.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 61GA3.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 998U8.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation ZVDP7.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 1S5J2.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 6TEIW.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 75ADF.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation DQHLN.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 38231.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation AV2LR.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 4YE76.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 7H631.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation O172T.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 00KBV.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation A7WSL.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 257A9.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation WI6B2.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation P22C6.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 30T0T.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation VP425.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 632ZU.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation GSQU0.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 562IF.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 3208C.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 5XP0V.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation V6500.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation W9JR3.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 34311.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 196Q2.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation S91FW.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 624V3.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 014OC.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation E1523.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation X7080.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 168KW.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation B3C40.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation B5H67.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation MRMLD.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation R94ZP.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation UR7PD.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 3212O.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation F1P64.exe -
Executes dropped EXE 64 IoCs
pid Process 3828 3622V.exe 4476 270P0.exe 4992 RS577.exe 1276 03L6B.exe 4392 LW2NQ.exe 816 JFWIB.exe 2736 G3190.exe 3240 9X6HR.exe 3044 W4FIY.exe 5088 F9CI2.exe 764 8H665.exe 4396 OK1DS.exe 4976 8JE50.exe 4480 31434.exe 3944 K1K38.exe 440 9M68D.exe 1688 LC0GX.exe 4156 R6L8O.exe 4192 R905X.exe 1716 P3P3G.exe 4936 A7WSL.exe 1524 B4T17.exe 552 H8736.exe 3572 I93OG.exe 2972 08DXV.exe 548 OD3EG.exe 3232 R94ZP.exe 5080 EA55F.exe 4468 XS501.exe 2556 1O5T4.exe 924 87C52.exe 3152 2GA3X.exe 1396 47CMP.exe 3980 XVN41.exe 4448 1JS1B.exe 4056 ZVDP7.exe 3700 HK0WB.exe 2368 92217.exe 3244 H19KN.exe 4828 7H631.exe 3976 VK3ES.exe 1388 15OTG.exe 964 W9JR3.exe 4332 UEK98.exe 3764 5C3F0.exe 2824 3212O.exe 536 35IG8.exe 3604 7N64Q.exe 1796 CP76I.exe 4816 79H12.exe 1816 NA9YQ.exe 5100 24102.exe 5080 XCTUF.exe 640 E9365.exe 1808 T12LA.exe 5088 FA112.exe 3752 039NZ.exe 876 S1500.exe 2548 I1A2D.exe 4920 Y2B62.exe 772 0LBIM.exe 4064 MEU22.exe 4428 6X9OE.exe 1948 Z8N11.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1232 2c2c53d0e3c1390f698b90937bed8900_NeikiAnalytics.exe 1232 2c2c53d0e3c1390f698b90937bed8900_NeikiAnalytics.exe 3828 3622V.exe 3828 3622V.exe 4476 270P0.exe 4476 270P0.exe 4992 RS577.exe 4992 RS577.exe 1276 03L6B.exe 1276 03L6B.exe 4392 LW2NQ.exe 4392 LW2NQ.exe 816 JFWIB.exe 816 JFWIB.exe 2736 G3190.exe 2736 G3190.exe 3240 9X6HR.exe 3240 9X6HR.exe 3044 W4FIY.exe 3044 W4FIY.exe 5088 F9CI2.exe 5088 F9CI2.exe 764 8H665.exe 764 8H665.exe 4396 OK1DS.exe 4396 OK1DS.exe 4976 8JE50.exe 4976 8JE50.exe 4480 31434.exe 4480 31434.exe 3944 K1K38.exe 3944 K1K38.exe 440 9M68D.exe 440 9M68D.exe 1688 LC0GX.exe 1688 LC0GX.exe 4156 R6L8O.exe 4156 R6L8O.exe 4192 R905X.exe 4192 R905X.exe 1716 P3P3G.exe 1716 P3P3G.exe 4936 A7WSL.exe 4936 A7WSL.exe 1524 B4T17.exe 1524 B4T17.exe 552 H8736.exe 552 H8736.exe 3572 I93OG.exe 3572 I93OG.exe 2972 08DXV.exe 2972 08DXV.exe 548 OD3EG.exe 548 OD3EG.exe 3232 R94ZP.exe 3232 R94ZP.exe 5080 EA55F.exe 5080 EA55F.exe 4468 XS501.exe 4468 XS501.exe 2556 1O5T4.exe 2556 1O5T4.exe 924 87C52.exe 924 87C52.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1232 wrote to memory of 3828 1232 2c2c53d0e3c1390f698b90937bed8900_NeikiAnalytics.exe 83 PID 1232 wrote to memory of 3828 1232 2c2c53d0e3c1390f698b90937bed8900_NeikiAnalytics.exe 83 PID 1232 wrote to memory of 3828 1232 2c2c53d0e3c1390f698b90937bed8900_NeikiAnalytics.exe 83 PID 3828 wrote to memory of 4476 3828 3622V.exe 85 PID 3828 wrote to memory of 4476 3828 3622V.exe 85 PID 3828 wrote to memory of 4476 3828 3622V.exe 85 PID 4476 wrote to memory of 4992 4476 270P0.exe 86 PID 4476 wrote to memory of 4992 4476 270P0.exe 86 PID 4476 wrote to memory of 4992 4476 270P0.exe 86 PID 4992 wrote to memory of 1276 4992 RS577.exe 87 PID 4992 wrote to memory of 1276 4992 RS577.exe 87 PID 4992 wrote to memory of 1276 4992 RS577.exe 87 PID 1276 wrote to memory of 4392 1276 03L6B.exe 88 PID 1276 wrote to memory of 4392 1276 03L6B.exe 88 PID 1276 wrote to memory of 4392 1276 03L6B.exe 88 PID 4392 wrote to memory of 816 4392 LW2NQ.exe 89 PID 4392 wrote to memory of 816 4392 LW2NQ.exe 89 PID 4392 wrote to memory of 816 4392 LW2NQ.exe 89 PID 816 wrote to memory of 2736 816 JFWIB.exe 90 PID 816 wrote to memory of 2736 816 JFWIB.exe 90 PID 816 wrote to memory of 2736 816 JFWIB.exe 90 PID 2736 wrote to memory of 3240 2736 G3190.exe 91 PID 2736 wrote to memory of 3240 2736 G3190.exe 91 PID 2736 wrote to memory of 3240 2736 G3190.exe 91 PID 3240 wrote to memory of 3044 3240 9X6HR.exe 92 PID 3240 wrote to memory of 3044 3240 9X6HR.exe 92 PID 3240 wrote to memory of 3044 3240 9X6HR.exe 92 PID 3044 wrote to memory of 5088 3044 W4FIY.exe 93 PID 3044 wrote to memory of 5088 3044 W4FIY.exe 93 PID 3044 wrote to memory of 5088 3044 W4FIY.exe 93 PID 5088 wrote to memory of 764 5088 F9CI2.exe 94 PID 5088 wrote to memory of 764 5088 F9CI2.exe 94 PID 5088 wrote to memory of 764 5088 F9CI2.exe 94 PID 764 wrote to memory of 4396 764 8H665.exe 95 PID 764 wrote to memory of 4396 764 8H665.exe 95 PID 764 wrote to memory of 4396 764 8H665.exe 95 PID 4396 wrote to memory of 4976 4396 OK1DS.exe 96 PID 4396 wrote to memory of 4976 4396 OK1DS.exe 96 PID 4396 wrote to memory of 4976 4396 OK1DS.exe 96 PID 4976 wrote to memory of 4480 4976 8JE50.exe 97 PID 4976 wrote to memory of 4480 4976 8JE50.exe 97 PID 4976 wrote to memory of 4480 4976 8JE50.exe 97 PID 4480 wrote to memory of 3944 4480 31434.exe 98 PID 4480 wrote to memory of 3944 4480 31434.exe 98 PID 4480 wrote to memory of 3944 4480 31434.exe 98 PID 3944 wrote to memory of 440 3944 K1K38.exe 99 PID 3944 wrote to memory of 440 3944 K1K38.exe 99 PID 3944 wrote to memory of 440 3944 K1K38.exe 99 PID 440 wrote to memory of 1688 440 9M68D.exe 100 PID 440 wrote to memory of 1688 440 9M68D.exe 100 PID 440 wrote to memory of 1688 440 9M68D.exe 100 PID 1688 wrote to memory of 4156 1688 LC0GX.exe 101 PID 1688 wrote to memory of 4156 1688 LC0GX.exe 101 PID 1688 wrote to memory of 4156 1688 LC0GX.exe 101 PID 4156 wrote to memory of 4192 4156 R6L8O.exe 102 PID 4156 wrote to memory of 4192 4156 R6L8O.exe 102 PID 4156 wrote to memory of 4192 4156 R6L8O.exe 102 PID 4192 wrote to memory of 1716 4192 R905X.exe 103 PID 4192 wrote to memory of 1716 4192 R905X.exe 103 PID 4192 wrote to memory of 1716 4192 R905X.exe 103 PID 1716 wrote to memory of 4936 1716 P3P3G.exe 104 PID 1716 wrote to memory of 4936 1716 P3P3G.exe 104 PID 1716 wrote to memory of 4936 1716 P3P3G.exe 104 PID 4936 wrote to memory of 1524 4936 A7WSL.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c2c53d0e3c1390f698b90937bed8900_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2c2c53d0e3c1390f698b90937bed8900_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\3622V.exe"C:\Users\Admin\AppData\Local\Temp\3622V.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\270P0.exe"C:\Users\Admin\AppData\Local\Temp\270P0.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\RS577.exe"C:\Users\Admin\AppData\Local\Temp\RS577.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\03L6B.exe"C:\Users\Admin\AppData\Local\Temp\03L6B.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\LW2NQ.exe"C:\Users\Admin\AppData\Local\Temp\LW2NQ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\JFWIB.exe"C:\Users\Admin\AppData\Local\Temp\JFWIB.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\G3190.exe"C:\Users\Admin\AppData\Local\Temp\G3190.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\9X6HR.exe"C:\Users\Admin\AppData\Local\Temp\9X6HR.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\W4FIY.exe"C:\Users\Admin\AppData\Local\Temp\W4FIY.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\F9CI2.exe"C:\Users\Admin\AppData\Local\Temp\F9CI2.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\8H665.exe"C:\Users\Admin\AppData\Local\Temp\8H665.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\OK1DS.exe"C:\Users\Admin\AppData\Local\Temp\OK1DS.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\8JE50.exe"C:\Users\Admin\AppData\Local\Temp\8JE50.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\31434.exe"C:\Users\Admin\AppData\Local\Temp\31434.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\K1K38.exe"C:\Users\Admin\AppData\Local\Temp\K1K38.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\9M68D.exe"C:\Users\Admin\AppData\Local\Temp\9M68D.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\LC0GX.exe"C:\Users\Admin\AppData\Local\Temp\LC0GX.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\R6L8O.exe"C:\Users\Admin\AppData\Local\Temp\R6L8O.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\R905X.exe"C:\Users\Admin\AppData\Local\Temp\R905X.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\P3P3G.exe"C:\Users\Admin\AppData\Local\Temp\P3P3G.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\A7WSL.exe"C:\Users\Admin\AppData\Local\Temp\A7WSL.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\B4T17.exe"C:\Users\Admin\AppData\Local\Temp\B4T17.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\H8736.exe"C:\Users\Admin\AppData\Local\Temp\H8736.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:552 -
C:\Users\Admin\AppData\Local\Temp\I93OG.exe"C:\Users\Admin\AppData\Local\Temp\I93OG.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\08DXV.exe"C:\Users\Admin\AppData\Local\Temp\08DXV.exe"26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\OD3EG.exe"C:\Users\Admin\AppData\Local\Temp\OD3EG.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:548 -
C:\Users\Admin\AppData\Local\Temp\R94ZP.exe"C:\Users\Admin\AppData\Local\Temp\R94ZP.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\EA55F.exe"C:\Users\Admin\AppData\Local\Temp\EA55F.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\XS501.exe"C:\Users\Admin\AppData\Local\Temp\XS501.exe"30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\1O5T4.exe"C:\Users\Admin\AppData\Local\Temp\1O5T4.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\87C52.exe"C:\Users\Admin\AppData\Local\Temp\87C52.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:924 -
C:\Users\Admin\AppData\Local\Temp\2GA3X.exe"C:\Users\Admin\AppData\Local\Temp\2GA3X.exe"33⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\47CMP.exe"C:\Users\Admin\AppData\Local\Temp\47CMP.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\XVN41.exe"C:\Users\Admin\AppData\Local\Temp\XVN41.exe"35⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\1JS1B.exe"C:\Users\Admin\AppData\Local\Temp\1JS1B.exe"36⤵
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\ZVDP7.exe"C:\Users\Admin\AppData\Local\Temp\ZVDP7.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\HK0WB.exe"C:\Users\Admin\AppData\Local\Temp\HK0WB.exe"38⤵
- Executes dropped EXE
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\92217.exe"C:\Users\Admin\AppData\Local\Temp\92217.exe"39⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\H19KN.exe"C:\Users\Admin\AppData\Local\Temp\H19KN.exe"40⤵
- Executes dropped EXE
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\7H631.exe"C:\Users\Admin\AppData\Local\Temp\7H631.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\VK3ES.exe"C:\Users\Admin\AppData\Local\Temp\VK3ES.exe"42⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\15OTG.exe"C:\Users\Admin\AppData\Local\Temp\15OTG.exe"43⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\W9JR3.exe"C:\Users\Admin\AppData\Local\Temp\W9JR3.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:964 -
C:\Users\Admin\AppData\Local\Temp\UEK98.exe"C:\Users\Admin\AppData\Local\Temp\UEK98.exe"45⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\5C3F0.exe"C:\Users\Admin\AppData\Local\Temp\5C3F0.exe"46⤵
- Executes dropped EXE
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\3212O.exe"C:\Users\Admin\AppData\Local\Temp\3212O.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\35IG8.exe"C:\Users\Admin\AppData\Local\Temp\35IG8.exe"48⤵
- Executes dropped EXE
PID:536 -
C:\Users\Admin\AppData\Local\Temp\7N64Q.exe"C:\Users\Admin\AppData\Local\Temp\7N64Q.exe"49⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\CP76I.exe"C:\Users\Admin\AppData\Local\Temp\CP76I.exe"50⤵
- Executes dropped EXE
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\79H12.exe"C:\Users\Admin\AppData\Local\Temp\79H12.exe"51⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\NA9YQ.exe"C:\Users\Admin\AppData\Local\Temp\NA9YQ.exe"52⤵
- Executes dropped EXE
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\24102.exe"C:\Users\Admin\AppData\Local\Temp\24102.exe"53⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\XCTUF.exe"C:\Users\Admin\AppData\Local\Temp\XCTUF.exe"54⤵
- Executes dropped EXE
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\E9365.exe"C:\Users\Admin\AppData\Local\Temp\E9365.exe"55⤵
- Executes dropped EXE
PID:640 -
C:\Users\Admin\AppData\Local\Temp\T12LA.exe"C:\Users\Admin\AppData\Local\Temp\T12LA.exe"56⤵
- Executes dropped EXE
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\FA112.exe"C:\Users\Admin\AppData\Local\Temp\FA112.exe"57⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\039NZ.exe"C:\Users\Admin\AppData\Local\Temp\039NZ.exe"58⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\S1500.exe"C:\Users\Admin\AppData\Local\Temp\S1500.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:876 -
C:\Users\Admin\AppData\Local\Temp\I1A2D.exe"C:\Users\Admin\AppData\Local\Temp\I1A2D.exe"60⤵
- Executes dropped EXE
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Y2B62.exe"C:\Users\Admin\AppData\Local\Temp\Y2B62.exe"61⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\0LBIM.exe"C:\Users\Admin\AppData\Local\Temp\0LBIM.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:772 -
C:\Users\Admin\AppData\Local\Temp\MEU22.exe"C:\Users\Admin\AppData\Local\Temp\MEU22.exe"63⤵
- Executes dropped EXE
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\6X9OE.exe"C:\Users\Admin\AppData\Local\Temp\6X9OE.exe"64⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\Z8N11.exe"C:\Users\Admin\AppData\Local\Temp\Z8N11.exe"65⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\W584W.exe"C:\Users\Admin\AppData\Local\Temp\W584W.exe"66⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\F0291.exe"C:\Users\Admin\AppData\Local\Temp\F0291.exe"67⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\RI9AW.exe"C:\Users\Admin\AppData\Local\Temp\RI9AW.exe"68⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\IE100.exe"C:\Users\Admin\AppData\Local\Temp\IE100.exe"69⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\AN66H.exe"C:\Users\Admin\AppData\Local\Temp\AN66H.exe"70⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\O172T.exe"C:\Users\Admin\AppData\Local\Temp\O172T.exe"71⤵
- Checks computer location settings
PID:448 -
C:\Users\Admin\AppData\Local\Temp\4J2O3.exe"C:\Users\Admin\AppData\Local\Temp\4J2O3.exe"72⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\58914.exe"C:\Users\Admin\AppData\Local\Temp\58914.exe"73⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\6MMJ7.exe"C:\Users\Admin\AppData\Local\Temp\6MMJ7.exe"74⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\A30D5.exe"C:\Users\Admin\AppData\Local\Temp\A30D5.exe"75⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\0254G.exe"C:\Users\Admin\AppData\Local\Temp\0254G.exe"76⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\B3C40.exe"C:\Users\Admin\AppData\Local\Temp\B3C40.exe"77⤵
- Checks computer location settings
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\NZ55M.exe"C:\Users\Admin\AppData\Local\Temp\NZ55M.exe"78⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\562IF.exe"C:\Users\Admin\AppData\Local\Temp\562IF.exe"79⤵
- Checks computer location settings
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\L0HCX.exe"C:\Users\Admin\AppData\Local\Temp\L0HCX.exe"80⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\XVG61.exe"C:\Users\Admin\AppData\Local\Temp\XVG61.exe"81⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\3LT46.exe"C:\Users\Admin\AppData\Local\Temp\3LT46.exe"82⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\8DPDR.exe"C:\Users\Admin\AppData\Local\Temp\8DPDR.exe"83⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\34311.exe"C:\Users\Admin\AppData\Local\Temp\34311.exe"84⤵
- Checks computer location settings
PID:636 -
C:\Users\Admin\AppData\Local\Temp\JXCW4.exe"C:\Users\Admin\AppData\Local\Temp\JXCW4.exe"85⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\7316R.exe"C:\Users\Admin\AppData\Local\Temp\7316R.exe"86⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\9J7U7.exe"C:\Users\Admin\AppData\Local\Temp\9J7U7.exe"87⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\7H206.exe"C:\Users\Admin\AppData\Local\Temp\7H206.exe"88⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\47M4X.exe"C:\Users\Admin\AppData\Local\Temp\47M4X.exe"89⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\9Y3N9.exe"C:\Users\Admin\AppData\Local\Temp\9Y3N9.exe"90⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\U7GAV.exe"C:\Users\Admin\AppData\Local\Temp\U7GAV.exe"91⤵
- Checks computer location settings
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\25R0W.exe"C:\Users\Admin\AppData\Local\Temp\25R0W.exe"92⤵
- Checks computer location settings
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\34CL3.exe"C:\Users\Admin\AppData\Local\Temp\34CL3.exe"93⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\246SD.exe"C:\Users\Admin\AppData\Local\Temp\246SD.exe"94⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\0B43G.exe"C:\Users\Admin\AppData\Local\Temp\0B43G.exe"95⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\V413S.exe"C:\Users\Admin\AppData\Local\Temp\V413S.exe"96⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\16W4C.exe"C:\Users\Admin\AppData\Local\Temp\16W4C.exe"97⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\8YRN6.exe"C:\Users\Admin\AppData\Local\Temp\8YRN6.exe"98⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\J105L.exe"C:\Users\Admin\AppData\Local\Temp\J105L.exe"99⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\U89FL.exe"C:\Users\Admin\AppData\Local\Temp\U89FL.exe"100⤵
- Checks computer location settings
PID:920 -
C:\Users\Admin\AppData\Local\Temp\FU8BI.exe"C:\Users\Admin\AppData\Local\Temp\FU8BI.exe"101⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\B5H67.exe"C:\Users\Admin\AppData\Local\Temp\B5H67.exe"102⤵
- Checks computer location settings
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\R7879.exe"C:\Users\Admin\AppData\Local\Temp\R7879.exe"103⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\X7R9E.exe"C:\Users\Admin\AppData\Local\Temp\X7R9E.exe"104⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\V037N.exe"C:\Users\Admin\AppData\Local\Temp\V037N.exe"105⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\K2U7F.exe"C:\Users\Admin\AppData\Local\Temp\K2U7F.exe"106⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\C7A97.exe"C:\Users\Admin\AppData\Local\Temp\C7A97.exe"107⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\7KV64.exe"C:\Users\Admin\AppData\Local\Temp\7KV64.exe"108⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\7U909.exe"C:\Users\Admin\AppData\Local\Temp\7U909.exe"109⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\C64AB.exe"C:\Users\Admin\AppData\Local\Temp\C64AB.exe"110⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\6RHX3.exe"C:\Users\Admin\AppData\Local\Temp\6RHX3.exe"111⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\33LBE.exe"C:\Users\Admin\AppData\Local\Temp\33LBE.exe"112⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\0Q91C.exe"C:\Users\Admin\AppData\Local\Temp\0Q91C.exe"113⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\0XJ40.exe"C:\Users\Admin\AppData\Local\Temp\0XJ40.exe"114⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\80FJD.exe"C:\Users\Admin\AppData\Local\Temp\80FJD.exe"115⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\T0OO1.exe"C:\Users\Admin\AppData\Local\Temp\T0OO1.exe"116⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\9ABE8.exe"C:\Users\Admin\AppData\Local\Temp\9ABE8.exe"117⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\6196C.exe"C:\Users\Admin\AppData\Local\Temp\6196C.exe"118⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\G60TU.exe"C:\Users\Admin\AppData\Local\Temp\G60TU.exe"119⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\IU8H9.exe"C:\Users\Admin\AppData\Local\Temp\IU8H9.exe"120⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\08461.exe"C:\Users\Admin\AppData\Local\Temp\08461.exe"121⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\8G2ZD.exe"C:\Users\Admin\AppData\Local\Temp\8G2ZD.exe"122⤵PID:4352
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-