Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 08:02
Behavioral task
behavioral1
Sample
a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe
-
Size
400KB
-
MD5
a905685f20c21d5fbe6c7144d74a35c0
-
SHA1
134c4c332b8a29be636ea5416c6f0312fc45d9ce
-
SHA256
a7202266198f593068666414fc5d08e3009750abc108b6081f74e26aebd3bdfb
-
SHA512
27259808902e48723b398a5f42ee8b9d02c1a5d6d48ea46a4a5864eb5407a058b38189c6b35f29d07f26210496737f0e05ca91c773a68cbe466a3de303eeac38
-
SSDEEP
6144:C4MYvqF+2KNBjVnP6oo3CYslL6+SL8g92S0+GlajBZDwcrdzYA0JxIkYofiF:CrYrJl6LCY2kt2SX5jMWYVbV6F
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation M0V43.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 069YT.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 32898.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation TYRVE.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation S4V4J.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 7Z6SO.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation C9EA0.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation ZU598.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 47M4X.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation NXWA4.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 2QZ66.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 2G74V.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 155WE.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation CG078.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation CXWHO.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 6U470.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B12T1.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 65669.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation JDAMQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 213E2.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation T841Z.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation UNCTP.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 6441C.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation O264D.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Z0RFT.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 63206.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 07JRK.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Y4JDM.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 149U8.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation DN783.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 4HYWM.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation M2065.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 5006H.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 2R7WW.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 149NM.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 6X9UY.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 6WF7O.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 92FXH.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation HA01I.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 2B6U3.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation D7V5F.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 92AA5.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation H5KG5.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 4W0YZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation D0559.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 57517.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation C271P.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 2095H.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 9CMXN.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 369D2.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation H1K80.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation OS904.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 5ZD0Q.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 8ERA2.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 11H58.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 4HR7J.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation G5Z6A.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 4ZUI2.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 6A190.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 71351.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 55IGJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 82M34.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation H9YND.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 1EPW9.exe -
Executes dropped EXE 64 IoCs
pid Process 1004 SMY3I.exe 4620 Q0A10.exe 4580 JXCW4.exe 212 HMK1R.exe 4472 5006H.exe 1868 CF301.exe 2224 26T0V.exe 2808 47M4X.exe 1644 0UT53.exe 2504 887CE.exe 3368 81119.exe 1676 70QJC.exe 3636 PD1QT.exe 948 4QHWR.exe 3224 Y275M.exe 1896 2188S.exe 3832 7F6WK.exe 1868 H1K80.exe 2540 BJYDU.exe 2808 BSF91.exe 4832 IY82Q.exe 940 905MC.exe 1412 22LZ1.exe 864 4LK54.exe 4984 90030.exe 1580 96BD6.exe 4912 L945U.exe 3240 55IGJ.exe 4040 271PP.exe 1152 240G7.exe 4976 13RDL.exe 1032 X3P89.exe 1764 Z8HRG.exe 3496 16UBA.exe 4924 EUN51.exe 2696 Y4JDM.exe 940 746EY.exe 4804 8971X.exe 1420 6V3E6.exe 884 HGUN2.exe 4288 32BH9.exe 4444 7MC93.exe 1104 1W5UW.exe 4644 6441C.exe 2632 HI7VH.exe 3684 3UL11.exe 4976 CXWHO.exe 556 V894L.exe 1056 H18H9.exe 764 740DI.exe 3188 A99K7.exe 4116 T841Z.exe 2748 SO74V.exe 2712 UNCTP.exe 5024 65SDE.exe 2320 149U8.exe 2224 91F46.exe 228 30JHZ.exe 1948 IV8WH.exe 452 2Y469.exe 4976 185Z7.exe 556 5X4DL.exe 3112 6U470.exe 4136 EEXD5.exe -
resource yara_rule behavioral2/memory/776-0-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0009000000023546-5.dat upx behavioral2/memory/1004-9-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/776-11-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000800000002354c-19.dat upx behavioral2/memory/1004-20-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000800000002354a-28.dat upx behavioral2/memory/4580-29-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/4620-31-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000700000002354d-39.dat upx behavioral2/memory/212-40-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/4580-41-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000700000002354e-48.dat upx behavioral2/memory/212-51-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000700000002354f-58.dat upx behavioral2/memory/4472-62-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/1868-60-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/1868-72-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x00080000000232fa-70.dat upx behavioral2/files/0x0009000000023550-79.dat upx behavioral2/memory/2224-82-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0008000000023553-89.dat upx behavioral2/memory/2808-92-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0007000000023554-100.dat upx behavioral2/memory/1644-102-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0008000000023555-110.dat upx behavioral2/memory/2504-112-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0007000000023558-120.dat upx behavioral2/memory/3368-122-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0004000000022975-129.dat upx behavioral2/memory/3636-131-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/1676-133-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000700000002296f-140.dat upx behavioral2/memory/948-142-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/3636-144-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0009000000023305-151.dat upx behavioral2/memory/948-154-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000800000002331d-162.dat upx behavioral2/memory/3224-164-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000a000000023308-172.dat upx behavioral2/memory/1896-175-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/3832-174-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000b0000000232ff-183.dat upx behavioral2/memory/1868-184-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/3832-186-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0009000000023317-193.dat upx behavioral2/memory/2540-196-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/1868-195-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000a00000002331b-203.dat upx behavioral2/memory/2540-206-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000900000002331e-213.dat upx behavioral2/memory/2808-216-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0009000000023320-223.dat upx behavioral2/memory/4832-226-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0008000000023321-233.dat upx behavioral2/memory/940-236-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0008000000023323-244.dat upx behavioral2/memory/864-246-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/1412-245-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0008000000023324-253.dat upx behavioral2/memory/864-256-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0008000000023326-263.dat upx behavioral2/memory/1580-265-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/4984-267-0x0000000000400000-0x0000000000539000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 776 a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe 776 a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe 1004 SMY3I.exe 1004 SMY3I.exe 4620 Q0A10.exe 4620 Q0A10.exe 4580 JXCW4.exe 4580 JXCW4.exe 212 HMK1R.exe 212 HMK1R.exe 4472 5006H.exe 4472 5006H.exe 1868 CF301.exe 1868 CF301.exe 2224 26T0V.exe 2224 26T0V.exe 2808 47M4X.exe 2808 47M4X.exe 1644 0UT53.exe 1644 0UT53.exe 2504 887CE.exe 2504 887CE.exe 3368 81119.exe 3368 81119.exe 1676 70QJC.exe 1676 70QJC.exe 3636 PD1QT.exe 3636 PD1QT.exe 948 4QHWR.exe 948 4QHWR.exe 3224 Y275M.exe 3224 Y275M.exe 1896 2188S.exe 1896 2188S.exe 3832 7F6WK.exe 3832 7F6WK.exe 1868 H1K80.exe 1868 H1K80.exe 2540 BJYDU.exe 2540 BJYDU.exe 2808 BSF91.exe 2808 BSF91.exe 4832 IY82Q.exe 4832 IY82Q.exe 940 905MC.exe 940 905MC.exe 1412 22LZ1.exe 1412 22LZ1.exe 864 4LK54.exe 864 4LK54.exe 4984 90030.exe 4984 90030.exe 1580 96BD6.exe 1580 96BD6.exe 4912 L945U.exe 4912 L945U.exe 3240 55IGJ.exe 3240 55IGJ.exe 4040 271PP.exe 4040 271PP.exe 1152 240G7.exe 1152 240G7.exe 4976 13RDL.exe 4976 13RDL.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 776 wrote to memory of 1004 776 a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe 90 PID 776 wrote to memory of 1004 776 a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe 90 PID 776 wrote to memory of 1004 776 a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe 90 PID 1004 wrote to memory of 4620 1004 SMY3I.exe 93 PID 1004 wrote to memory of 4620 1004 SMY3I.exe 93 PID 1004 wrote to memory of 4620 1004 SMY3I.exe 93 PID 4620 wrote to memory of 4580 4620 Q0A10.exe 94 PID 4620 wrote to memory of 4580 4620 Q0A10.exe 94 PID 4620 wrote to memory of 4580 4620 Q0A10.exe 94 PID 4580 wrote to memory of 212 4580 JXCW4.exe 95 PID 4580 wrote to memory of 212 4580 JXCW4.exe 95 PID 4580 wrote to memory of 212 4580 JXCW4.exe 95 PID 212 wrote to memory of 4472 212 HMK1R.exe 96 PID 212 wrote to memory of 4472 212 HMK1R.exe 96 PID 212 wrote to memory of 4472 212 HMK1R.exe 96 PID 4472 wrote to memory of 1868 4472 5006H.exe 97 PID 4472 wrote to memory of 1868 4472 5006H.exe 97 PID 4472 wrote to memory of 1868 4472 5006H.exe 97 PID 1868 wrote to memory of 2224 1868 CF301.exe 98 PID 1868 wrote to memory of 2224 1868 CF301.exe 98 PID 1868 wrote to memory of 2224 1868 CF301.exe 98 PID 2224 wrote to memory of 2808 2224 26T0V.exe 99 PID 2224 wrote to memory of 2808 2224 26T0V.exe 99 PID 2224 wrote to memory of 2808 2224 26T0V.exe 99 PID 2808 wrote to memory of 1644 2808 47M4X.exe 100 PID 2808 wrote to memory of 1644 2808 47M4X.exe 100 PID 2808 wrote to memory of 1644 2808 47M4X.exe 100 PID 1644 wrote to memory of 2504 1644 0UT53.exe 101 PID 1644 wrote to memory of 2504 1644 0UT53.exe 101 PID 1644 wrote to memory of 2504 1644 0UT53.exe 101 PID 2504 wrote to memory of 3368 2504 887CE.exe 102 PID 2504 wrote to memory of 3368 2504 887CE.exe 102 PID 2504 wrote to memory of 3368 2504 887CE.exe 102 PID 3368 wrote to memory of 1676 3368 81119.exe 105 PID 3368 wrote to memory of 1676 3368 81119.exe 105 PID 3368 wrote to memory of 1676 3368 81119.exe 105 PID 1676 wrote to memory of 3636 1676 70QJC.exe 106 PID 1676 wrote to memory of 3636 1676 70QJC.exe 106 PID 1676 wrote to memory of 3636 1676 70QJC.exe 106 PID 3636 wrote to memory of 948 3636 PD1QT.exe 107 PID 3636 wrote to memory of 948 3636 PD1QT.exe 107 PID 3636 wrote to memory of 948 3636 PD1QT.exe 107 PID 948 wrote to memory of 3224 948 4QHWR.exe 108 PID 948 wrote to memory of 3224 948 4QHWR.exe 108 PID 948 wrote to memory of 3224 948 4QHWR.exe 108 PID 3224 wrote to memory of 1896 3224 Y275M.exe 109 PID 3224 wrote to memory of 1896 3224 Y275M.exe 109 PID 3224 wrote to memory of 1896 3224 Y275M.exe 109 PID 1896 wrote to memory of 3832 1896 2188S.exe 111 PID 1896 wrote to memory of 3832 1896 2188S.exe 111 PID 1896 wrote to memory of 3832 1896 2188S.exe 111 PID 3832 wrote to memory of 1868 3832 7F6WK.exe 112 PID 3832 wrote to memory of 1868 3832 7F6WK.exe 112 PID 3832 wrote to memory of 1868 3832 7F6WK.exe 112 PID 1868 wrote to memory of 2540 1868 H1K80.exe 113 PID 1868 wrote to memory of 2540 1868 H1K80.exe 113 PID 1868 wrote to memory of 2540 1868 H1K80.exe 113 PID 2540 wrote to memory of 2808 2540 BJYDU.exe 114 PID 2540 wrote to memory of 2808 2540 BJYDU.exe 114 PID 2540 wrote to memory of 2808 2540 BJYDU.exe 114 PID 2808 wrote to memory of 4832 2808 BSF91.exe 115 PID 2808 wrote to memory of 4832 2808 BSF91.exe 115 PID 2808 wrote to memory of 4832 2808 BSF91.exe 115 PID 4832 wrote to memory of 940 4832 IY82Q.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a905685f20c21d5fbe6c7144d74a35c0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\SMY3I.exe"C:\Users\Admin\AppData\Local\Temp\SMY3I.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\Q0A10.exe"C:\Users\Admin\AppData\Local\Temp\Q0A10.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\JXCW4.exe"C:\Users\Admin\AppData\Local\Temp\JXCW4.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\HMK1R.exe"C:\Users\Admin\AppData\Local\Temp\HMK1R.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\5006H.exe"C:\Users\Admin\AppData\Local\Temp\5006H.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\CF301.exe"C:\Users\Admin\AppData\Local\Temp\CF301.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\26T0V.exe"C:\Users\Admin\AppData\Local\Temp\26T0V.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\47M4X.exe"C:\Users\Admin\AppData\Local\Temp\47M4X.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\0UT53.exe"C:\Users\Admin\AppData\Local\Temp\0UT53.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\887CE.exe"C:\Users\Admin\AppData\Local\Temp\887CE.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\81119.exe"C:\Users\Admin\AppData\Local\Temp\81119.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\70QJC.exe"C:\Users\Admin\AppData\Local\Temp\70QJC.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\PD1QT.exe"C:\Users\Admin\AppData\Local\Temp\PD1QT.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\4QHWR.exe"C:\Users\Admin\AppData\Local\Temp\4QHWR.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\Y275M.exe"C:\Users\Admin\AppData\Local\Temp\Y275M.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\2188S.exe"C:\Users\Admin\AppData\Local\Temp\2188S.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\7F6WK.exe"C:\Users\Admin\AppData\Local\Temp\7F6WK.exe"18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\H1K80.exe"C:\Users\Admin\AppData\Local\Temp\H1K80.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\BJYDU.exe"C:\Users\Admin\AppData\Local\Temp\BJYDU.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\BSF91.exe"C:\Users\Admin\AppData\Local\Temp\BSF91.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IY82Q.exe"C:\Users\Admin\AppData\Local\Temp\IY82Q.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\905MC.exe"C:\Users\Admin\AppData\Local\Temp\905MC.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:940 -
C:\Users\Admin\AppData\Local\Temp\22LZ1.exe"C:\Users\Admin\AppData\Local\Temp\22LZ1.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\4LK54.exe"C:\Users\Admin\AppData\Local\Temp\4LK54.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:864 -
C:\Users\Admin\AppData\Local\Temp\90030.exe"C:\Users\Admin\AppData\Local\Temp\90030.exe"26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\96BD6.exe"C:\Users\Admin\AppData\Local\Temp\96BD6.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\L945U.exe"C:\Users\Admin\AppData\Local\Temp\L945U.exe"28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\55IGJ.exe"C:\Users\Admin\AppData\Local\Temp\55IGJ.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\271PP.exe"C:\Users\Admin\AppData\Local\Temp\271PP.exe"30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\240G7.exe"C:\Users\Admin\AppData\Local\Temp\240G7.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\13RDL.exe"C:\Users\Admin\AppData\Local\Temp\13RDL.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\X3P89.exe"C:\Users\Admin\AppData\Local\Temp\X3P89.exe"33⤵
- Executes dropped EXE
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\Z8HRG.exe"C:\Users\Admin\AppData\Local\Temp\Z8HRG.exe"34⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\16UBA.exe"C:\Users\Admin\AppData\Local\Temp\16UBA.exe"35⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\EUN51.exe"C:\Users\Admin\AppData\Local\Temp\EUN51.exe"36⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\Y4JDM.exe"C:\Users\Admin\AppData\Local\Temp\Y4JDM.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\746EY.exe"C:\Users\Admin\AppData\Local\Temp\746EY.exe"38⤵
- Executes dropped EXE
PID:940 -
C:\Users\Admin\AppData\Local\Temp\8971X.exe"C:\Users\Admin\AppData\Local\Temp\8971X.exe"39⤵
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\6V3E6.exe"C:\Users\Admin\AppData\Local\Temp\6V3E6.exe"40⤵
- Executes dropped EXE
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\HGUN2.exe"C:\Users\Admin\AppData\Local\Temp\HGUN2.exe"41⤵
- Executes dropped EXE
PID:884 -
C:\Users\Admin\AppData\Local\Temp\32BH9.exe"C:\Users\Admin\AppData\Local\Temp\32BH9.exe"42⤵
- Executes dropped EXE
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\7MC93.exe"C:\Users\Admin\AppData\Local\Temp\7MC93.exe"43⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\1W5UW.exe"C:\Users\Admin\AppData\Local\Temp\1W5UW.exe"44⤵
- Executes dropped EXE
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\6441C.exe"C:\Users\Admin\AppData\Local\Temp\6441C.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\HI7VH.exe"C:\Users\Admin\AppData\Local\Temp\HI7VH.exe"46⤵
- Executes dropped EXE
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\3UL11.exe"C:\Users\Admin\AppData\Local\Temp\3UL11.exe"47⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\CXWHO.exe"C:\Users\Admin\AppData\Local\Temp\CXWHO.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\V894L.exe"C:\Users\Admin\AppData\Local\Temp\V894L.exe"49⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\H18H9.exe"C:\Users\Admin\AppData\Local\Temp\H18H9.exe"50⤵
- Executes dropped EXE
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\740DI.exe"C:\Users\Admin\AppData\Local\Temp\740DI.exe"51⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\A99K7.exe"C:\Users\Admin\AppData\Local\Temp\A99K7.exe"52⤵
- Executes dropped EXE
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\T841Z.exe"C:\Users\Admin\AppData\Local\Temp\T841Z.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\SO74V.exe"C:\Users\Admin\AppData\Local\Temp\SO74V.exe"54⤵
- Executes dropped EXE
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\UNCTP.exe"C:\Users\Admin\AppData\Local\Temp\UNCTP.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\65SDE.exe"C:\Users\Admin\AppData\Local\Temp\65SDE.exe"56⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\149U8.exe"C:\Users\Admin\AppData\Local\Temp\149U8.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\91F46.exe"C:\Users\Admin\AppData\Local\Temp\91F46.exe"58⤵
- Executes dropped EXE
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\30JHZ.exe"C:\Users\Admin\AppData\Local\Temp\30JHZ.exe"59⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IV8WH.exe"C:\Users\Admin\AppData\Local\Temp\IV8WH.exe"60⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\2Y469.exe"C:\Users\Admin\AppData\Local\Temp\2Y469.exe"61⤵
- Executes dropped EXE
PID:452 -
C:\Users\Admin\AppData\Local\Temp\185Z7.exe"C:\Users\Admin\AppData\Local\Temp\185Z7.exe"62⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\5X4DL.exe"C:\Users\Admin\AppData\Local\Temp\5X4DL.exe"63⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\6U470.exe"C:\Users\Admin\AppData\Local\Temp\6U470.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\EEXD5.exe"C:\Users\Admin\AppData\Local\Temp\EEXD5.exe"65⤵
- Executes dropped EXE
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\65451.exe"C:\Users\Admin\AppData\Local\Temp\65451.exe"66⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\EU79T.exe"C:\Users\Admin\AppData\Local\Temp\EU79T.exe"67⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\OS904.exe"C:\Users\Admin\AppData\Local\Temp\OS904.exe"68⤵
- Checks computer location settings
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\05K59.exe"C:\Users\Admin\AppData\Local\Temp\05K59.exe"69⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\OJM06.exe"C:\Users\Admin\AppData\Local\Temp\OJM06.exe"70⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\ZBLIC.exe"C:\Users\Admin\AppData\Local\Temp\ZBLIC.exe"71⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\2L0RQ.exe"C:\Users\Admin\AppData\Local\Temp\2L0RQ.exe"72⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\E5Z2C.exe"C:\Users\Admin\AppData\Local\Temp\E5Z2C.exe"73⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\82M34.exe"C:\Users\Admin\AppData\Local\Temp\82M34.exe"74⤵
- Checks computer location settings
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\3E992.exe"C:\Users\Admin\AppData\Local\Temp\3E992.exe"75⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\0H069.exe"C:\Users\Admin\AppData\Local\Temp\0H069.exe"76⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\NXWA4.exe"C:\Users\Admin\AppData\Local\Temp\NXWA4.exe"77⤵
- Checks computer location settings
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\E038Q.exe"C:\Users\Admin\AppData\Local\Temp\E038Q.exe"78⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\BOC1M.exe"C:\Users\Admin\AppData\Local\Temp\BOC1M.exe"79⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\1LQG5.exe"C:\Users\Admin\AppData\Local\Temp\1LQG5.exe"80⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\DI9TS.exe"C:\Users\Admin\AppData\Local\Temp\DI9TS.exe"81⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\M0405.exe"C:\Users\Admin\AppData\Local\Temp\M0405.exe"82⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\G42Q8.exe"C:\Users\Admin\AppData\Local\Temp\G42Q8.exe"83⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\7OX2Z.exe"C:\Users\Admin\AppData\Local\Temp\7OX2Z.exe"84⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\C9EA0.exe"C:\Users\Admin\AppData\Local\Temp\C9EA0.exe"85⤵
- Checks computer location settings
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\98P34.exe"C:\Users\Admin\AppData\Local\Temp\98P34.exe"86⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\31NSJ.exe"C:\Users\Admin\AppData\Local\Temp\31NSJ.exe"87⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\J3149.exe"C:\Users\Admin\AppData\Local\Temp\J3149.exe"88⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\6URED.exe"C:\Users\Admin\AppData\Local\Temp\6URED.exe"89⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\O67ZD.exe"C:\Users\Admin\AppData\Local\Temp\O67ZD.exe"90⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\4ZUI2.exe"C:\Users\Admin\AppData\Local\Temp\4ZUI2.exe"91⤵
- Checks computer location settings
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\2U5QR.exe"C:\Users\Admin\AppData\Local\Temp\2U5QR.exe"92⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\D97X0.exe"C:\Users\Admin\AppData\Local\Temp\D97X0.exe"93⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\S4V4J.exe"C:\Users\Admin\AppData\Local\Temp\S4V4J.exe"94⤵
- Checks computer location settings
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\49DVQ.exe"C:\Users\Admin\AppData\Local\Temp\49DVQ.exe"95⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\TAOSQ.exe"C:\Users\Admin\AppData\Local\Temp\TAOSQ.exe"96⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\KL4BF.exe"C:\Users\Admin\AppData\Local\Temp\KL4BF.exe"97⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\72271.exe"C:\Users\Admin\AppData\Local\Temp\72271.exe"98⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\6SL7J.exe"C:\Users\Admin\AppData\Local\Temp\6SL7J.exe"99⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\AB886.exe"C:\Users\Admin\AppData\Local\Temp\AB886.exe"100⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\51G18.exe"C:\Users\Admin\AppData\Local\Temp\51G18.exe"101⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\Z0RFT.exe"C:\Users\Admin\AppData\Local\Temp\Z0RFT.exe"102⤵
- Checks computer location settings
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\99C35.exe"C:\Users\Admin\AppData\Local\Temp\99C35.exe"103⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\2NJRA.exe"C:\Users\Admin\AppData\Local\Temp\2NJRA.exe"104⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\MMRI0.exe"C:\Users\Admin\AppData\Local\Temp\MMRI0.exe"105⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\5L3XE.exe"C:\Users\Admin\AppData\Local\Temp\5L3XE.exe"106⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\M9009.exe"C:\Users\Admin\AppData\Local\Temp\M9009.exe"107⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\7Z6SO.exe"C:\Users\Admin\AppData\Local\Temp\7Z6SO.exe"108⤵
- Checks computer location settings
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\5X614.exe"C:\Users\Admin\AppData\Local\Temp\5X614.exe"109⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\B12T1.exe"C:\Users\Admin\AppData\Local\Temp\B12T1.exe"110⤵
- Checks computer location settings
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\H1UHK.exe"C:\Users\Admin\AppData\Local\Temp\H1UHK.exe"111⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\838VD.exe"C:\Users\Admin\AppData\Local\Temp\838VD.exe"112⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\65669.exe"C:\Users\Admin\AppData\Local\Temp\65669.exe"113⤵
- Checks computer location settings
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\D6Z8V.exe"C:\Users\Admin\AppData\Local\Temp\D6Z8V.exe"114⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\W4I63.exe"C:\Users\Admin\AppData\Local\Temp\W4I63.exe"115⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\M599I.exe"C:\Users\Admin\AppData\Local\Temp\M599I.exe"116⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\6OAYQ.exe"C:\Users\Admin\AppData\Local\Temp\6OAYQ.exe"117⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\4YCYI.exe"C:\Users\Admin\AppData\Local\Temp\4YCYI.exe"118⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\EBM67.exe"C:\Users\Admin\AppData\Local\Temp\EBM67.exe"119⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\IEZMU.exe"C:\Users\Admin\AppData\Local\Temp\IEZMU.exe"120⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\32NC7.exe"C:\Users\Admin\AppData\Local\Temp\32NC7.exe"121⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\D7V5F.exe"C:\Users\Admin\AppData\Local\Temp\D7V5F.exe"122⤵
- Checks computer location settings
PID:4508
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-