Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 08:02 UTC
Behavioral task
behavioral1
Sample
a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe
-
Size
400KB
-
MD5
a905685f20c21d5fbe6c7144d74a35c0
-
SHA1
134c4c332b8a29be636ea5416c6f0312fc45d9ce
-
SHA256
a7202266198f593068666414fc5d08e3009750abc108b6081f74e26aebd3bdfb
-
SHA512
27259808902e48723b398a5f42ee8b9d02c1a5d6d48ea46a4a5864eb5407a058b38189c6b35f29d07f26210496737f0e05ca91c773a68cbe466a3de303eeac38
-
SSDEEP
6144:C4MYvqF+2KNBjVnP6oo3CYslL6+SL8g92S0+GlajBZDwcrdzYA0JxIkYofiF:CrYrJl6LCY2kt2SX5jMWYVbV6F
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3040 1M3QN.exe 3060 87Y97.exe 2704 HUS5K.exe 2620 L1888.exe 2532 1N478.exe 2892 V56B2.exe 1420 679L2.exe 2736 5C9LZ.exe 2148 J3664.exe 1516 3Q54X.exe 2864 0YO03.exe 2108 6A786.exe 476 PTBON.exe 628 12442.exe 1988 1740B.exe 1540 PBI79.exe 2192 A7AJK.exe 700 ED862.exe 2176 A7SZU.exe 876 U29DN.exe 1588 2L3CN.exe 2144 6P760.exe 3040 R9681.exe 3060 3LM6V.exe 2768 010S9.exe 2584 05M2U.exe 2168 7L7B2.exe 2648 0QJX3.exe 2656 PSZ36.exe 2716 LPCM7.exe 2348 1AK49.exe 1848 0I498.exe 2148 6V1OF.exe 2912 71869.exe 2880 562OK.exe 2240 6SI1V.exe 492 2J3W8.exe 2596 F170I.exe 2236 11BW6.exe 628 7088P.exe 1364 9UXOJ.exe 3012 BNW57.exe 2180 746PN.exe 604 S742M.exe 2188 9OKR5.exe 1048 TZ8VU.exe 2176 719JI.exe 2040 8IG40.exe 1276 BC0RP.exe 2156 4562O.exe 2700 24IS2.exe 2448 AK21Z.exe 2704 1R1S1.exe 2976 1FP96.exe 2436 952KR.exe 2628 GT616.exe 2668 BHDL2.exe 1776 W071P.exe 2616 Y16U5.exe 1612 CNC8H.exe 3068 G32DT.exe 2788 67G54.exe 1308 7GYED.exe 304 O13BU.exe -
Loads dropped DLL 64 IoCs
pid Process 2956 a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe 2956 a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe 3040 1M3QN.exe 3040 1M3QN.exe 3060 87Y97.exe 3060 87Y97.exe 2704 HUS5K.exe 2704 HUS5K.exe 2620 L1888.exe 2620 L1888.exe 2532 1N478.exe 2532 1N478.exe 2892 V56B2.exe 2892 V56B2.exe 1420 679L2.exe 1420 679L2.exe 2736 5C9LZ.exe 2736 5C9LZ.exe 2148 J3664.exe 2148 J3664.exe 1516 3Q54X.exe 1516 3Q54X.exe 2864 0YO03.exe 2864 0YO03.exe 2108 6A786.exe 2108 6A786.exe 476 PTBON.exe 476 PTBON.exe 628 12442.exe 628 12442.exe 1988 1740B.exe 1988 1740B.exe 1540 PBI79.exe 1540 PBI79.exe 2192 A7AJK.exe 2192 A7AJK.exe 700 ED862.exe 700 ED862.exe 2176 A7SZU.exe 2176 A7SZU.exe 876 U29DN.exe 876 U29DN.exe 1588 2L3CN.exe 1588 2L3CN.exe 2144 6P760.exe 2144 6P760.exe 3040 R9681.exe 3040 R9681.exe 3060 3LM6V.exe 3060 3LM6V.exe 2768 010S9.exe 2768 010S9.exe 2584 05M2U.exe 2584 05M2U.exe 2168 7L7B2.exe 2168 7L7B2.exe 2648 0QJX3.exe 2648 0QJX3.exe 2656 PSZ36.exe 2656 PSZ36.exe 2716 LPCM7.exe 2716 LPCM7.exe 2348 1AK49.exe 2348 1AK49.exe -
resource yara_rule behavioral1/memory/2956-0-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/files/0x000a000000015cb6-7.dat upx behavioral1/memory/3040-13-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2956-11-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/files/0x0035000000015d42-17.dat upx behavioral1/memory/3060-25-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/3040-24-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/files/0x0008000000015d6b-29.dat upx behavioral1/memory/2704-38-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/3060-37-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2704-50-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2620-51-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/files/0x0007000000015d7f-49.dat upx behavioral1/memory/2620-63-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/files/0x0007000000015d87-64.dat upx behavioral1/memory/2532-75-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/files/0x0007000000015d93-73.dat upx behavioral1/memory/2892-76-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/files/0x0035000000015d4e-80.dat upx behavioral1/memory/2892-89-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/1420-88-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/files/0x0007000000015e32-96.dat upx behavioral1/memory/2736-103-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/1420-101-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/files/0x0008000000015ecc-107.dat upx behavioral1/memory/2736-115-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/1516-129-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2148-128-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/files/0x0006000000016cdc-126.dat upx behavioral1/files/0x0006000000016d07-139.dat upx behavioral1/memory/2864-157-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/files/0x0006000000016d18-159.dat upx behavioral1/files/0x0006000000016d20-162.dat upx behavioral1/memory/476-171-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2108-170-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/files/0x0006000000016d34-175.dat upx behavioral1/memory/628-184-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/476-183-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/files/0x0006000000016d3a-193.dat upx behavioral1/memory/628-197-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/1540-210-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/1988-209-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/files/0x0006000000016d3e-211.dat upx behavioral1/memory/700-230-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2192-229-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2176-239-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/700-238-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/1540-220-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/876-248-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2176-247-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/876-259-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/1588-256-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/1588-269-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/3040-281-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/3060-292-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/3040-291-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/3060-300-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2584-309-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2768-308-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2168-317-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2584-319-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2168-327-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2648-334-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/2656-341-0x0000000000400000-0x0000000000539000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2956 a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe 2956 a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe 3040 1M3QN.exe 3040 1M3QN.exe 3060 87Y97.exe 3060 87Y97.exe 2704 HUS5K.exe 2704 HUS5K.exe 2620 L1888.exe 2620 L1888.exe 2532 1N478.exe 2532 1N478.exe 2892 V56B2.exe 2892 V56B2.exe 1420 679L2.exe 1420 679L2.exe 2736 5C9LZ.exe 2736 5C9LZ.exe 2148 J3664.exe 2148 J3664.exe 1516 3Q54X.exe 1516 3Q54X.exe 2864 0YO03.exe 2864 0YO03.exe 2108 6A786.exe 2108 6A786.exe 476 PTBON.exe 476 PTBON.exe 628 12442.exe 628 12442.exe 1988 1740B.exe 1988 1740B.exe 1540 PBI79.exe 1540 PBI79.exe 2192 A7AJK.exe 2192 A7AJK.exe 700 ED862.exe 700 ED862.exe 2176 A7SZU.exe 2176 A7SZU.exe 876 U29DN.exe 876 U29DN.exe 1588 2L3CN.exe 1588 2L3CN.exe 2144 6P760.exe 2144 6P760.exe 3040 R9681.exe 3040 R9681.exe 3060 3LM6V.exe 3060 3LM6V.exe 2768 010S9.exe 2768 010S9.exe 2584 05M2U.exe 2584 05M2U.exe 2168 7L7B2.exe 2168 7L7B2.exe 2648 0QJX3.exe 2648 0QJX3.exe 2656 PSZ36.exe 2656 PSZ36.exe 2716 LPCM7.exe 2716 LPCM7.exe 2348 1AK49.exe 2348 1AK49.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2956 wrote to memory of 3040 2956 a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe 50 PID 2956 wrote to memory of 3040 2956 a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe 50 PID 2956 wrote to memory of 3040 2956 a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe 50 PID 2956 wrote to memory of 3040 2956 a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe 50 PID 3040 wrote to memory of 3060 3040 1M3QN.exe 271 PID 3040 wrote to memory of 3060 3040 1M3QN.exe 271 PID 3040 wrote to memory of 3060 3040 1M3QN.exe 271 PID 3040 wrote to memory of 3060 3040 1M3QN.exe 271 PID 3060 wrote to memory of 2704 3060 87Y97.exe 262 PID 3060 wrote to memory of 2704 3060 87Y97.exe 262 PID 3060 wrote to memory of 2704 3060 87Y97.exe 262 PID 3060 wrote to memory of 2704 3060 87Y97.exe 262 PID 2704 wrote to memory of 2620 2704 HUS5K.exe 31 PID 2704 wrote to memory of 2620 2704 HUS5K.exe 31 PID 2704 wrote to memory of 2620 2704 HUS5K.exe 31 PID 2704 wrote to memory of 2620 2704 HUS5K.exe 31 PID 2620 wrote to memory of 2532 2620 L1888.exe 32 PID 2620 wrote to memory of 2532 2620 L1888.exe 32 PID 2620 wrote to memory of 2532 2620 L1888.exe 32 PID 2620 wrote to memory of 2532 2620 L1888.exe 32 PID 2532 wrote to memory of 2892 2532 1N478.exe 33 PID 2532 wrote to memory of 2892 2532 1N478.exe 33 PID 2532 wrote to memory of 2892 2532 1N478.exe 33 PID 2532 wrote to memory of 2892 2532 1N478.exe 33 PID 2892 wrote to memory of 1420 2892 V56B2.exe 367 PID 2892 wrote to memory of 1420 2892 V56B2.exe 367 PID 2892 wrote to memory of 1420 2892 V56B2.exe 367 PID 2892 wrote to memory of 1420 2892 V56B2.exe 367 PID 1420 wrote to memory of 2736 1420 679L2.exe 35 PID 1420 wrote to memory of 2736 1420 679L2.exe 35 PID 1420 wrote to memory of 2736 1420 679L2.exe 35 PID 1420 wrote to memory of 2736 1420 679L2.exe 35 PID 2736 wrote to memory of 2148 2736 5C9LZ.exe 36 PID 2736 wrote to memory of 2148 2736 5C9LZ.exe 36 PID 2736 wrote to memory of 2148 2736 5C9LZ.exe 36 PID 2736 wrote to memory of 2148 2736 5C9LZ.exe 36 PID 2148 wrote to memory of 1516 2148 J3664.exe 120 PID 2148 wrote to memory of 1516 2148 J3664.exe 120 PID 2148 wrote to memory of 1516 2148 J3664.exe 120 PID 2148 wrote to memory of 1516 2148 J3664.exe 120 PID 1516 wrote to memory of 2864 1516 3Q54X.exe 38 PID 1516 wrote to memory of 2864 1516 3Q54X.exe 38 PID 1516 wrote to memory of 2864 1516 3Q54X.exe 38 PID 1516 wrote to memory of 2864 1516 3Q54X.exe 38 PID 2864 wrote to memory of 2108 2864 0YO03.exe 39 PID 2864 wrote to memory of 2108 2864 0YO03.exe 39 PID 2864 wrote to memory of 2108 2864 0YO03.exe 39 PID 2864 wrote to memory of 2108 2864 0YO03.exe 39 PID 2108 wrote to memory of 476 2108 6A786.exe 40 PID 2108 wrote to memory of 476 2108 6A786.exe 40 PID 2108 wrote to memory of 476 2108 6A786.exe 40 PID 2108 wrote to memory of 476 2108 6A786.exe 40 PID 476 wrote to memory of 628 476 PTBON.exe 41 PID 476 wrote to memory of 628 476 PTBON.exe 41 PID 476 wrote to memory of 628 476 PTBON.exe 41 PID 476 wrote to memory of 628 476 PTBON.exe 41 PID 628 wrote to memory of 1988 628 12442.exe 42 PID 628 wrote to memory of 1988 628 12442.exe 42 PID 628 wrote to memory of 1988 628 12442.exe 42 PID 628 wrote to memory of 1988 628 12442.exe 42 PID 1988 wrote to memory of 1540 1988 1740B.exe 43 PID 1988 wrote to memory of 1540 1988 1740B.exe 43 PID 1988 wrote to memory of 1540 1988 1740B.exe 43 PID 1988 wrote to memory of 1540 1988 1740B.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\1M3QN.exe"C:\Users\Admin\AppData\Local\Temp\1M3QN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\87Y97.exe"C:\Users\Admin\AppData\Local\Temp\87Y97.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\HUS5K.exe"C:\Users\Admin\AppData\Local\Temp\HUS5K.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\L1888.exe"C:\Users\Admin\AppData\Local\Temp\L1888.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\1N478.exe"C:\Users\Admin\AppData\Local\Temp\1N478.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\V56B2.exe"C:\Users\Admin\AppData\Local\Temp\V56B2.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\679L2.exe"C:\Users\Admin\AppData\Local\Temp\679L2.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\5C9LZ.exe"C:\Users\Admin\AppData\Local\Temp\5C9LZ.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\J3664.exe"C:\Users\Admin\AppData\Local\Temp\J3664.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\3Q54X.exe"C:\Users\Admin\AppData\Local\Temp\3Q54X.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\0YO03.exe"C:\Users\Admin\AppData\Local\Temp\0YO03.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\6A786.exe"C:\Users\Admin\AppData\Local\Temp\6A786.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\PTBON.exe"C:\Users\Admin\AppData\Local\Temp\PTBON.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Users\Admin\AppData\Local\Temp\12442.exe"C:\Users\Admin\AppData\Local\Temp\12442.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\1740B.exe"C:\Users\Admin\AppData\Local\Temp\1740B.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\PBI79.exe"C:\Users\Admin\AppData\Local\Temp\PBI79.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\A7AJK.exe"C:\Users\Admin\AppData\Local\Temp\A7AJK.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\ED862.exe"C:\Users\Admin\AppData\Local\Temp\ED862.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:700 -
C:\Users\Admin\AppData\Local\Temp\A7SZU.exe"C:\Users\Admin\AppData\Local\Temp\A7SZU.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\U29DN.exe"C:\Users\Admin\AppData\Local\Temp\U29DN.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:876 -
C:\Users\Admin\AppData\Local\Temp\2L3CN.exe"C:\Users\Admin\AppData\Local\Temp\2L3CN.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\6P760.exe"C:\Users\Admin\AppData\Local\Temp\6P760.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\R9681.exe"C:\Users\Admin\AppData\Local\Temp\R9681.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\3LM6V.exe"C:\Users\Admin\AppData\Local\Temp\3LM6V.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\010S9.exe"C:\Users\Admin\AppData\Local\Temp\010S9.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\05M2U.exe"C:\Users\Admin\AppData\Local\Temp\05M2U.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\7L7B2.exe"C:\Users\Admin\AppData\Local\Temp\7L7B2.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\0QJX3.exe"C:\Users\Admin\AppData\Local\Temp\0QJX3.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\PSZ36.exe"C:\Users\Admin\AppData\Local\Temp\PSZ36.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\LPCM7.exe"C:\Users\Admin\AppData\Local\Temp\LPCM7.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\1AK49.exe"C:\Users\Admin\AppData\Local\Temp\1AK49.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\0I498.exe"C:\Users\Admin\AppData\Local\Temp\0I498.exe"33⤵
- Executes dropped EXE
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\6V1OF.exe"C:\Users\Admin\AppData\Local\Temp\6V1OF.exe"34⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\71869.exe"C:\Users\Admin\AppData\Local\Temp\71869.exe"35⤵
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\562OK.exe"C:\Users\Admin\AppData\Local\Temp\562OK.exe"36⤵
- Executes dropped EXE
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\6SI1V.exe"C:\Users\Admin\AppData\Local\Temp\6SI1V.exe"37⤵
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\2J3W8.exe"C:\Users\Admin\AppData\Local\Temp\2J3W8.exe"38⤵
- Executes dropped EXE
PID:492 -
C:\Users\Admin\AppData\Local\Temp\F170I.exe"C:\Users\Admin\AppData\Local\Temp\F170I.exe"39⤵
- Executes dropped EXE
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\11BW6.exe"C:\Users\Admin\AppData\Local\Temp\11BW6.exe"40⤵
- Executes dropped EXE
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\7088P.exe"C:\Users\Admin\AppData\Local\Temp\7088P.exe"41⤵
- Executes dropped EXE
PID:628 -
C:\Users\Admin\AppData\Local\Temp\9UXOJ.exe"C:\Users\Admin\AppData\Local\Temp\9UXOJ.exe"42⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\BNW57.exe"C:\Users\Admin\AppData\Local\Temp\BNW57.exe"43⤵
- Executes dropped EXE
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\746PN.exe"C:\Users\Admin\AppData\Local\Temp\746PN.exe"44⤵
- Executes dropped EXE
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\S742M.exe"C:\Users\Admin\AppData\Local\Temp\S742M.exe"45⤵
- Executes dropped EXE
PID:604 -
C:\Users\Admin\AppData\Local\Temp\9OKR5.exe"C:\Users\Admin\AppData\Local\Temp\9OKR5.exe"46⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\TZ8VU.exe"C:\Users\Admin\AppData\Local\Temp\TZ8VU.exe"47⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\719JI.exe"C:\Users\Admin\AppData\Local\Temp\719JI.exe"48⤵
- Executes dropped EXE
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\8IG40.exe"C:\Users\Admin\AppData\Local\Temp\8IG40.exe"49⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\X4X58.exe"C:\Users\Admin\AppData\Local\Temp\X4X58.exe"50⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\BC0RP.exe"C:\Users\Admin\AppData\Local\Temp\BC0RP.exe"51⤵
- Executes dropped EXE
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\4562O.exe"C:\Users\Admin\AppData\Local\Temp\4562O.exe"52⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\24IS2.exe"C:\Users\Admin\AppData\Local\Temp\24IS2.exe"53⤵
- Executes dropped EXE
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\AK21Z.exe"C:\Users\Admin\AppData\Local\Temp\AK21Z.exe"54⤵
- Executes dropped EXE
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\1R1S1.exe"C:\Users\Admin\AppData\Local\Temp\1R1S1.exe"55⤵
- Executes dropped EXE
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\1FP96.exe"C:\Users\Admin\AppData\Local\Temp\1FP96.exe"56⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\952KR.exe"C:\Users\Admin\AppData\Local\Temp\952KR.exe"57⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\GT616.exe"C:\Users\Admin\AppData\Local\Temp\GT616.exe"58⤵
- Executes dropped EXE
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\BHDL2.exe"C:\Users\Admin\AppData\Local\Temp\BHDL2.exe"59⤵
- Executes dropped EXE
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\W071P.exe"C:\Users\Admin\AppData\Local\Temp\W071P.exe"60⤵
- Executes dropped EXE
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\Y16U5.exe"C:\Users\Admin\AppData\Local\Temp\Y16U5.exe"61⤵
- Executes dropped EXE
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\CNC8H.exe"C:\Users\Admin\AppData\Local\Temp\CNC8H.exe"62⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\G32DT.exe"C:\Users\Admin\AppData\Local\Temp\G32DT.exe"63⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\67G54.exe"C:\Users\Admin\AppData\Local\Temp\67G54.exe"64⤵
- Executes dropped EXE
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\7GYED.exe"C:\Users\Admin\AppData\Local\Temp\7GYED.exe"65⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\O13BU.exe"C:\Users\Admin\AppData\Local\Temp\O13BU.exe"66⤵
- Executes dropped EXE
PID:304 -
C:\Users\Admin\AppData\Local\Temp\J4O31.exe"C:\Users\Admin\AppData\Local\Temp\J4O31.exe"67⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\4Q8N5.exe"C:\Users\Admin\AppData\Local\Temp\4Q8N5.exe"68⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\D7TCH.exe"C:\Users\Admin\AppData\Local\Temp\D7TCH.exe"69⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\GC3YG.exe"C:\Users\Admin\AppData\Local\Temp\GC3YG.exe"70⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\077V1.exe"C:\Users\Admin\AppData\Local\Temp\077V1.exe"71⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\8737Q.exe"C:\Users\Admin\AppData\Local\Temp\8737Q.exe"72⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\0E7NC.exe"C:\Users\Admin\AppData\Local\Temp\0E7NC.exe"73⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\82630.exe"C:\Users\Admin\AppData\Local\Temp\82630.exe"74⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\XJSF0.exe"C:\Users\Admin\AppData\Local\Temp\XJSF0.exe"75⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\4ZO0J.exe"C:\Users\Admin\AppData\Local\Temp\4ZO0J.exe"76⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\4151U.exe"C:\Users\Admin\AppData\Local\Temp\4151U.exe"77⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\NN2N4.exe"C:\Users\Admin\AppData\Local\Temp\NN2N4.exe"78⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\615DQ.exe"C:\Users\Admin\AppData\Local\Temp\615DQ.exe"79⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\9Z7YC.exe"C:\Users\Admin\AppData\Local\Temp\9Z7YC.exe"80⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\053V0.exe"C:\Users\Admin\AppData\Local\Temp\053V0.exe"81⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\OS938.exe"C:\Users\Admin\AppData\Local\Temp\OS938.exe"82⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\SVYGJ.exe"C:\Users\Admin\AppData\Local\Temp\SVYGJ.exe"83⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\6240I.exe"C:\Users\Admin\AppData\Local\Temp\6240I.exe"84⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\WO814.exe"C:\Users\Admin\AppData\Local\Temp\WO814.exe"85⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\A3GO2.exe"C:\Users\Admin\AppData\Local\Temp\A3GO2.exe"86⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\3OU8U.exe"C:\Users\Admin\AppData\Local\Temp\3OU8U.exe"87⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\179Z1.exe"C:\Users\Admin\AppData\Local\Temp\179Z1.exe"88⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\Q0O68.exe"C:\Users\Admin\AppData\Local\Temp\Q0O68.exe"89⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\9K18B.exe"C:\Users\Admin\AppData\Local\Temp\9K18B.exe"90⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\02TIS.exe"C:\Users\Admin\AppData\Local\Temp\02TIS.exe"91⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\KJGG8.exe"C:\Users\Admin\AppData\Local\Temp\KJGG8.exe"92⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\60968.exe"C:\Users\Admin\AppData\Local\Temp\60968.exe"93⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\4P8QZ.exe"C:\Users\Admin\AppData\Local\Temp\4P8QZ.exe"94⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\40N89.exe"C:\Users\Admin\AppData\Local\Temp\40N89.exe"95⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\A36J9.exe"C:\Users\Admin\AppData\Local\Temp\A36J9.exe"96⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\1L05G.exe"C:\Users\Admin\AppData\Local\Temp\1L05G.exe"97⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\I019D.exe"C:\Users\Admin\AppData\Local\Temp\I019D.exe"98⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\CK708.exe"C:\Users\Admin\AppData\Local\Temp\CK708.exe"99⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\71N58.exe"C:\Users\Admin\AppData\Local\Temp\71N58.exe"100⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\RE27K.exe"C:\Users\Admin\AppData\Local\Temp\RE27K.exe"101⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\K56SB.exe"C:\Users\Admin\AppData\Local\Temp\K56SB.exe"102⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\5ZN28.exe"C:\Users\Admin\AppData\Local\Temp\5ZN28.exe"103⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\5ADM2.exe"C:\Users\Admin\AppData\Local\Temp\5ADM2.exe"104⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\CS9RA.exe"C:\Users\Admin\AppData\Local\Temp\CS9RA.exe"105⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\XDU0A.exe"C:\Users\Admin\AppData\Local\Temp\XDU0A.exe"106⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\94LL6.exe"C:\Users\Admin\AppData\Local\Temp\94LL6.exe"107⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\2O141.exe"C:\Users\Admin\AppData\Local\Temp\2O141.exe"108⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\D876G.exe"C:\Users\Admin\AppData\Local\Temp\D876G.exe"109⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\6ITLY.exe"C:\Users\Admin\AppData\Local\Temp\6ITLY.exe"110⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\79K25.exe"C:\Users\Admin\AppData\Local\Temp\79K25.exe"111⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\MB64N.exe"C:\Users\Admin\AppData\Local\Temp\MB64N.exe"112⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\3J49K.exe"C:\Users\Admin\AppData\Local\Temp\3J49K.exe"113⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\44018.exe"C:\Users\Admin\AppData\Local\Temp\44018.exe"114⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\JDGN8.exe"C:\Users\Admin\AppData\Local\Temp\JDGN8.exe"115⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\9357R.exe"C:\Users\Admin\AppData\Local\Temp\9357R.exe"116⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\0J2XD.exe"C:\Users\Admin\AppData\Local\Temp\0J2XD.exe"117⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\02JU5.exe"C:\Users\Admin\AppData\Local\Temp\02JU5.exe"118⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\N5973.exe"C:\Users\Admin\AppData\Local\Temp\N5973.exe"119⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\HF3FK.exe"C:\Users\Admin\AppData\Local\Temp\HF3FK.exe"120⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\59992.exe"C:\Users\Admin\AppData\Local\Temp\59992.exe"121⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\X52R3.exe"C:\Users\Admin\AppData\Local\Temp\X52R3.exe"122⤵PID:2536
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-