Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 10:46
Behavioral task
behavioral1
Sample
c7e7bd2fdae1f6656071682e1a7c31a0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c7e7bd2fdae1f6656071682e1a7c31a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
c7e7bd2fdae1f6656071682e1a7c31a0_NeikiAnalytics.exe
-
Size
403KB
-
MD5
c7e7bd2fdae1f6656071682e1a7c31a0
-
SHA1
7ac918aa451768101fd8bf542fbe4faf21053bc8
-
SHA256
80833c8f6ecd5ed6c5a2493ea108e2a2985fc0ce79828da46189c995b609e125
-
SHA512
f02ea1c316597e56ede49d2d52c4d4dbc03ac06eb0109b73a97299868004d8824eae2a8125dbe15e949e596146d1c9da716e0d7abad2dfda809dfd17cb5d1728
-
SSDEEP
12288:RvvQ9PZW+Py1XOvW2/w+JZ14ObAKaB8OYgX:RA9PZfPyEO2Nz9UKaB8O/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation U6YP0.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation WO32C.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation E05TT.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation MK9F4.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation OKIA1.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 5I4KN.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation T7IGV.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 3M7DX.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation BW3F5.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation FF22I.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation W5CXI.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 7XN68.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 776Y8.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 7626S.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation U6M53.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 52293.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Z7Y70.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation GA3R0.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 02MMU.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation D185N.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation WI6B2.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 00WPH.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation S8DIZ.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation IC5D1.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation F4UF6.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation XA2UV.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation YJ85Y.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 1643Z.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 1S1H2.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 2J0GY.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 49RBJ.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 15KX8.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation X125F.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation T6SFL.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation O8854.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation RM9IK.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation c7e7bd2fdae1f6656071682e1a7c31a0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation AC33N.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 9UL92.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 41M11.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation HS278.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation O99FC.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 9N3GD.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation S2EYN.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 2T36Q.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation S9V51.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation MI3P9.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 26M9D.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 58891.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 4J7I8.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 5V474.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Z7BK8.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation F67J8.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation N4Y58.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation A3207.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 668RS.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation C683B.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation X28HJ.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation VQILE.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 75ESC.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation HJ397.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation K3PP2.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 3S3WY.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 5UF1B.exe -
Executes dropped EXE 64 IoCs
pid Process 3100 1M45L.exe 2024 870S6.exe 2288 5E3RI.exe 4616 CL1B4.exe 1012 R9PB2.exe 2348 7SSIZ.exe 2188 P06T9.exe 2940 9CDDK.exe 1500 59O8U.exe 3996 L0X3D.exe 3496 I1106.exe 3784 ESGL1.exe 1612 98R38.exe 4320 NXDKH.exe 4952 I5I1V.exe 1360 S9V51.exe 1300 N15SL.exe 2336 T90W0.exe 2168 00WPH.exe 2116 OH15O.exe 3740 G84O3.exe 1808 2JPP8.exe 536 55JZI.exe 3476 TU581.exe 5116 3H05T.exe 1744 F4UF6.exe 2548 719XM.exe 4952 VT2W5.exe 1900 15KX8.exe 1580 4JDQI.exe 1088 U6M53.exe 1392 9JF7B.exe 3668 BLGW5.exe 4376 6R9GL.exe 2380 A223L.exe 4672 PQ792.exe 5116 49RBJ.exe 1780 HS278.exe 1964 9FQ2H.exe 4528 CR2Q5.exe 3424 1U9TY.exe 4336 QIB57.exe 2156 E403S.exe 4196 58891.exe 4112 1DK49.exe 4600 1EH0E.exe 1184 92776.exe 2888 XA2UV.exe 4548 SP367.exe 1976 5R6A9.exe 1840 8XDT7.exe 2408 U62MR.exe 2744 MI3P9.exe 1780 26I0T.exe 4596 7BFWG.exe 3452 6JT79.exe 3304 SRQDI.exe 3420 91ZN0.exe 3912 4468W.exe 1556 B2V46.exe 2520 W51GA.exe 532 E91Y5.exe 4256 YJ85Y.exe 1504 99WO9.exe -
resource yara_rule behavioral2/memory/1852-0-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0008000000023421-5.dat upx behavioral2/memory/3100-9-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/1852-11-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0007000000023425-19.dat upx behavioral2/memory/2024-20-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/3100-22-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0007000000023426-30.dat upx behavioral2/memory/2024-32-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0007000000023427-40.dat upx behavioral2/memory/2288-42-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0008000000023422-49.dat upx behavioral2/memory/1012-51-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/4616-53-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/2348-62-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/1012-63-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0007000000023429-61.dat upx behavioral2/files/0x000700000002342a-70.dat upx behavioral2/memory/2348-73-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000700000002342b-81.dat upx behavioral2/memory/2188-82-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/2940-92-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000700000002342c-90.dat upx behavioral2/memory/3996-103-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/1500-102-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000700000002342d-100.dat upx behavioral2/files/0x0009000000023379-110.dat upx behavioral2/memory/3996-113-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/3496-123-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/3784-122-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000700000002342e-121.dat upx behavioral2/files/0x000700000002297a-130.dat upx behavioral2/memory/3784-134-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000700000002342f-142.dat upx behavioral2/memory/4320-145-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/1612-144-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0007000000023430-152.dat upx behavioral2/memory/4320-156-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/4952-155-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0007000000023431-164.dat upx behavioral2/memory/4952-165-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/1360-174-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0007000000023432-173.dat upx behavioral2/files/0x0007000000023435-182.dat upx behavioral2/memory/1300-185-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0007000000023436-193.dat upx behavioral2/memory/2336-195-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/2168-204-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0007000000023438-203.dat upx behavioral2/memory/2336-183-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/2116-213-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x0007000000023439-212.dat upx behavioral2/files/0x000700000002343a-220.dat upx behavioral2/memory/3740-222-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000700000002343b-230.dat upx behavioral2/memory/1808-231-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000700000002343c-238.dat upx behavioral2/memory/536-241-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/3476-242-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000700000002343d-250.dat upx behavioral2/memory/5116-253-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/memory/3476-252-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral2/files/0x000700000002343e-260.dat upx behavioral2/memory/5116-263-0x0000000000400000-0x0000000000539000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1852 c7e7bd2fdae1f6656071682e1a7c31a0_NeikiAnalytics.exe 1852 c7e7bd2fdae1f6656071682e1a7c31a0_NeikiAnalytics.exe 3100 1M45L.exe 3100 1M45L.exe 2024 870S6.exe 2024 870S6.exe 2288 5E3RI.exe 2288 5E3RI.exe 4616 CL1B4.exe 4616 CL1B4.exe 1012 R9PB2.exe 1012 R9PB2.exe 2348 7SSIZ.exe 2348 7SSIZ.exe 2188 P06T9.exe 2188 P06T9.exe 2940 9CDDK.exe 2940 9CDDK.exe 1500 59O8U.exe 1500 59O8U.exe 3996 L0X3D.exe 3996 L0X3D.exe 3496 I1106.exe 3496 I1106.exe 3784 ESGL1.exe 3784 ESGL1.exe 1612 98R38.exe 1612 98R38.exe 4320 NXDKH.exe 4320 NXDKH.exe 4952 I5I1V.exe 4952 I5I1V.exe 1360 S9V51.exe 1360 S9V51.exe 1300 N15SL.exe 1300 N15SL.exe 2336 T90W0.exe 2336 T90W0.exe 2168 00WPH.exe 2168 00WPH.exe 2116 OH15O.exe 2116 OH15O.exe 3740 G84O3.exe 3740 G84O3.exe 1808 2JPP8.exe 1808 2JPP8.exe 536 55JZI.exe 536 55JZI.exe 3476 TU581.exe 3476 TU581.exe 5116 3H05T.exe 5116 3H05T.exe 1744 F4UF6.exe 1744 F4UF6.exe 2548 719XM.exe 2548 719XM.exe 4952 VT2W5.exe 4952 VT2W5.exe 1900 15KX8.exe 1900 15KX8.exe 1580 4JDQI.exe 1580 4JDQI.exe 1088 U6M53.exe 1088 U6M53.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1852 wrote to memory of 3100 1852 c7e7bd2fdae1f6656071682e1a7c31a0_NeikiAnalytics.exe 83 PID 1852 wrote to memory of 3100 1852 c7e7bd2fdae1f6656071682e1a7c31a0_NeikiAnalytics.exe 83 PID 1852 wrote to memory of 3100 1852 c7e7bd2fdae1f6656071682e1a7c31a0_NeikiAnalytics.exe 83 PID 3100 wrote to memory of 2024 3100 1M45L.exe 86 PID 3100 wrote to memory of 2024 3100 1M45L.exe 86 PID 3100 wrote to memory of 2024 3100 1M45L.exe 86 PID 2024 wrote to memory of 2288 2024 870S6.exe 88 PID 2024 wrote to memory of 2288 2024 870S6.exe 88 PID 2024 wrote to memory of 2288 2024 870S6.exe 88 PID 2288 wrote to memory of 4616 2288 5E3RI.exe 89 PID 2288 wrote to memory of 4616 2288 5E3RI.exe 89 PID 2288 wrote to memory of 4616 2288 5E3RI.exe 89 PID 4616 wrote to memory of 1012 4616 CL1B4.exe 90 PID 4616 wrote to memory of 1012 4616 CL1B4.exe 90 PID 4616 wrote to memory of 1012 4616 CL1B4.exe 90 PID 1012 wrote to memory of 2348 1012 R9PB2.exe 91 PID 1012 wrote to memory of 2348 1012 R9PB2.exe 91 PID 1012 wrote to memory of 2348 1012 R9PB2.exe 91 PID 2348 wrote to memory of 2188 2348 7SSIZ.exe 93 PID 2348 wrote to memory of 2188 2348 7SSIZ.exe 93 PID 2348 wrote to memory of 2188 2348 7SSIZ.exe 93 PID 2188 wrote to memory of 2940 2188 P06T9.exe 94 PID 2188 wrote to memory of 2940 2188 P06T9.exe 94 PID 2188 wrote to memory of 2940 2188 P06T9.exe 94 PID 2940 wrote to memory of 1500 2940 9CDDK.exe 95 PID 2940 wrote to memory of 1500 2940 9CDDK.exe 95 PID 2940 wrote to memory of 1500 2940 9CDDK.exe 95 PID 1500 wrote to memory of 3996 1500 59O8U.exe 96 PID 1500 wrote to memory of 3996 1500 59O8U.exe 96 PID 1500 wrote to memory of 3996 1500 59O8U.exe 96 PID 3996 wrote to memory of 3496 3996 L0X3D.exe 97 PID 3996 wrote to memory of 3496 3996 L0X3D.exe 97 PID 3996 wrote to memory of 3496 3996 L0X3D.exe 97 PID 3496 wrote to memory of 3784 3496 I1106.exe 98 PID 3496 wrote to memory of 3784 3496 I1106.exe 98 PID 3496 wrote to memory of 3784 3496 I1106.exe 98 PID 3784 wrote to memory of 1612 3784 ESGL1.exe 101 PID 3784 wrote to memory of 1612 3784 ESGL1.exe 101 PID 3784 wrote to memory of 1612 3784 ESGL1.exe 101 PID 1612 wrote to memory of 4320 1612 98R38.exe 102 PID 1612 wrote to memory of 4320 1612 98R38.exe 102 PID 1612 wrote to memory of 4320 1612 98R38.exe 102 PID 4320 wrote to memory of 4952 4320 NXDKH.exe 220 PID 4320 wrote to memory of 4952 4320 NXDKH.exe 220 PID 4320 wrote to memory of 4952 4320 NXDKH.exe 220 PID 4952 wrote to memory of 1360 4952 I5I1V.exe 176 PID 4952 wrote to memory of 1360 4952 I5I1V.exe 176 PID 4952 wrote to memory of 1360 4952 I5I1V.exe 176 PID 1360 wrote to memory of 1300 1360 S9V51.exe 105 PID 1360 wrote to memory of 1300 1360 S9V51.exe 105 PID 1360 wrote to memory of 1300 1360 S9V51.exe 105 PID 1300 wrote to memory of 2336 1300 N15SL.exe 106 PID 1300 wrote to memory of 2336 1300 N15SL.exe 106 PID 1300 wrote to memory of 2336 1300 N15SL.exe 106 PID 2336 wrote to memory of 2168 2336 T90W0.exe 108 PID 2336 wrote to memory of 2168 2336 T90W0.exe 108 PID 2336 wrote to memory of 2168 2336 T90W0.exe 108 PID 2168 wrote to memory of 2116 2168 00WPH.exe 110 PID 2168 wrote to memory of 2116 2168 00WPH.exe 110 PID 2168 wrote to memory of 2116 2168 00WPH.exe 110 PID 2116 wrote to memory of 3740 2116 OH15O.exe 111 PID 2116 wrote to memory of 3740 2116 OH15O.exe 111 PID 2116 wrote to memory of 3740 2116 OH15O.exe 111 PID 3740 wrote to memory of 1808 3740 G84O3.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7e7bd2fdae1f6656071682e1a7c31a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c7e7bd2fdae1f6656071682e1a7c31a0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\1M45L.exe"C:\Users\Admin\AppData\Local\Temp\1M45L.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\870S6.exe"C:\Users\Admin\AppData\Local\Temp\870S6.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\5E3RI.exe"C:\Users\Admin\AppData\Local\Temp\5E3RI.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\CL1B4.exe"C:\Users\Admin\AppData\Local\Temp\CL1B4.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\R9PB2.exe"C:\Users\Admin\AppData\Local\Temp\R9PB2.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\7SSIZ.exe"C:\Users\Admin\AppData\Local\Temp\7SSIZ.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\P06T9.exe"C:\Users\Admin\AppData\Local\Temp\P06T9.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\9CDDK.exe"C:\Users\Admin\AppData\Local\Temp\9CDDK.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\59O8U.exe"C:\Users\Admin\AppData\Local\Temp\59O8U.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\L0X3D.exe"C:\Users\Admin\AppData\Local\Temp\L0X3D.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\I1106.exe"C:\Users\Admin\AppData\Local\Temp\I1106.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\ESGL1.exe"C:\Users\Admin\AppData\Local\Temp\ESGL1.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\98R38.exe"C:\Users\Admin\AppData\Local\Temp\98R38.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\NXDKH.exe"C:\Users\Admin\AppData\Local\Temp\NXDKH.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\I5I1V.exe"C:\Users\Admin\AppData\Local\Temp\I5I1V.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\S9V51.exe"C:\Users\Admin\AppData\Local\Temp\S9V51.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\N15SL.exe"C:\Users\Admin\AppData\Local\Temp\N15SL.exe"18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\T90W0.exe"C:\Users\Admin\AppData\Local\Temp\T90W0.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\00WPH.exe"C:\Users\Admin\AppData\Local\Temp\00WPH.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\OH15O.exe"C:\Users\Admin\AppData\Local\Temp\OH15O.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\G84O3.exe"C:\Users\Admin\AppData\Local\Temp\G84O3.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\2JPP8.exe"C:\Users\Admin\AppData\Local\Temp\2JPP8.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\55JZI.exe"C:\Users\Admin\AppData\Local\Temp\55JZI.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:536 -
C:\Users\Admin\AppData\Local\Temp\TU581.exe"C:\Users\Admin\AppData\Local\Temp\TU581.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\3H05T.exe"C:\Users\Admin\AppData\Local\Temp\3H05T.exe"26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\F4UF6.exe"C:\Users\Admin\AppData\Local\Temp\F4UF6.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\719XM.exe"C:\Users\Admin\AppData\Local\Temp\719XM.exe"28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\VT2W5.exe"C:\Users\Admin\AppData\Local\Temp\VT2W5.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\15KX8.exe"C:\Users\Admin\AppData\Local\Temp\15KX8.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\4JDQI.exe"C:\Users\Admin\AppData\Local\Temp\4JDQI.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\U6M53.exe"C:\Users\Admin\AppData\Local\Temp\U6M53.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\9JF7B.exe"C:\Users\Admin\AppData\Local\Temp\9JF7B.exe"33⤵
- Executes dropped EXE
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\BLGW5.exe"C:\Users\Admin\AppData\Local\Temp\BLGW5.exe"34⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\6R9GL.exe"C:\Users\Admin\AppData\Local\Temp\6R9GL.exe"35⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\A223L.exe"C:\Users\Admin\AppData\Local\Temp\A223L.exe"36⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\PQ792.exe"C:\Users\Admin\AppData\Local\Temp\PQ792.exe"37⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\49RBJ.exe"C:\Users\Admin\AppData\Local\Temp\49RBJ.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\HS278.exe"C:\Users\Admin\AppData\Local\Temp\HS278.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\9FQ2H.exe"C:\Users\Admin\AppData\Local\Temp\9FQ2H.exe"40⤵
- Executes dropped EXE
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\CR2Q5.exe"C:\Users\Admin\AppData\Local\Temp\CR2Q5.exe"41⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\1U9TY.exe"C:\Users\Admin\AppData\Local\Temp\1U9TY.exe"42⤵
- Executes dropped EXE
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\QIB57.exe"C:\Users\Admin\AppData\Local\Temp\QIB57.exe"43⤵
- Executes dropped EXE
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\E403S.exe"C:\Users\Admin\AppData\Local\Temp\E403S.exe"44⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\58891.exe"C:\Users\Admin\AppData\Local\Temp\58891.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\1DK49.exe"C:\Users\Admin\AppData\Local\Temp\1DK49.exe"46⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\1EH0E.exe"C:\Users\Admin\AppData\Local\Temp\1EH0E.exe"47⤵
- Executes dropped EXE
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\92776.exe"C:\Users\Admin\AppData\Local\Temp\92776.exe"48⤵
- Executes dropped EXE
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\XA2UV.exe"C:\Users\Admin\AppData\Local\Temp\XA2UV.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\SP367.exe"C:\Users\Admin\AppData\Local\Temp\SP367.exe"50⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\5R6A9.exe"C:\Users\Admin\AppData\Local\Temp\5R6A9.exe"51⤵
- Executes dropped EXE
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\8XDT7.exe"C:\Users\Admin\AppData\Local\Temp\8XDT7.exe"52⤵
- Executes dropped EXE
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\U62MR.exe"C:\Users\Admin\AppData\Local\Temp\U62MR.exe"53⤵
- Executes dropped EXE
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\MI3P9.exe"C:\Users\Admin\AppData\Local\Temp\MI3P9.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\26I0T.exe"C:\Users\Admin\AppData\Local\Temp\26I0T.exe"55⤵
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\7BFWG.exe"C:\Users\Admin\AppData\Local\Temp\7BFWG.exe"56⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\6JT79.exe"C:\Users\Admin\AppData\Local\Temp\6JT79.exe"57⤵
- Executes dropped EXE
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\SRQDI.exe"C:\Users\Admin\AppData\Local\Temp\SRQDI.exe"58⤵
- Executes dropped EXE
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\91ZN0.exe"C:\Users\Admin\AppData\Local\Temp\91ZN0.exe"59⤵
- Executes dropped EXE
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\4468W.exe"C:\Users\Admin\AppData\Local\Temp\4468W.exe"60⤵
- Executes dropped EXE
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\B2V46.exe"C:\Users\Admin\AppData\Local\Temp\B2V46.exe"61⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\W51GA.exe"C:\Users\Admin\AppData\Local\Temp\W51GA.exe"62⤵
- Executes dropped EXE
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\E91Y5.exe"C:\Users\Admin\AppData\Local\Temp\E91Y5.exe"63⤵
- Executes dropped EXE
PID:532 -
C:\Users\Admin\AppData\Local\Temp\YJ85Y.exe"C:\Users\Admin\AppData\Local\Temp\YJ85Y.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\99WO9.exe"C:\Users\Admin\AppData\Local\Temp\99WO9.exe"65⤵
- Executes dropped EXE
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\6Q433.exe"C:\Users\Admin\AppData\Local\Temp\6Q433.exe"66⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\H4016.exe"C:\Users\Admin\AppData\Local\Temp\H4016.exe"67⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\35E6L.exe"C:\Users\Admin\AppData\Local\Temp\35E6L.exe"68⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\B77PY.exe"C:\Users\Admin\AppData\Local\Temp\B77PY.exe"69⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\O4M45.exe"C:\Users\Admin\AppData\Local\Temp\O4M45.exe"70⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\52293.exe"C:\Users\Admin\AppData\Local\Temp\52293.exe"71⤵
- Checks computer location settings
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\1643Z.exe"C:\Users\Admin\AppData\Local\Temp\1643Z.exe"72⤵
- Checks computer location settings
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\JND03.exe"C:\Users\Admin\AppData\Local\Temp\JND03.exe"73⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\OG0SX.exe"C:\Users\Admin\AppData\Local\Temp\OG0SX.exe"74⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\2SC97.exe"C:\Users\Admin\AppData\Local\Temp\2SC97.exe"75⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\RUC2N.exe"C:\Users\Admin\AppData\Local\Temp\RUC2N.exe"76⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\5D1RB.exe"C:\Users\Admin\AppData\Local\Temp\5D1RB.exe"77⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\G35CO.exe"C:\Users\Admin\AppData\Local\Temp\G35CO.exe"78⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\7XN68.exe"C:\Users\Admin\AppData\Local\Temp\7XN68.exe"79⤵
- Checks computer location settings
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\7926H.exe"C:\Users\Admin\AppData\Local\Temp\7926H.exe"80⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\A3207.exe"C:\Users\Admin\AppData\Local\Temp\A3207.exe"81⤵
- Checks computer location settings
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\10U4L.exe"C:\Users\Admin\AppData\Local\Temp\10U4L.exe"82⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\TB8A8.exe"C:\Users\Admin\AppData\Local\Temp\TB8A8.exe"83⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\AP8S9.exe"C:\Users\Admin\AppData\Local\Temp\AP8S9.exe"84⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\WX807.exe"C:\Users\Admin\AppData\Local\Temp\WX807.exe"85⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\9J37I.exe"C:\Users\Admin\AppData\Local\Temp\9J37I.exe"86⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\69IC8.exe"C:\Users\Admin\AppData\Local\Temp\69IC8.exe"87⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\O99FC.exe"C:\Users\Admin\AppData\Local\Temp\O99FC.exe"88⤵
- Checks computer location settings
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\J1T46.exe"C:\Users\Admin\AppData\Local\Temp\J1T46.exe"89⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\661VL.exe"C:\Users\Admin\AppData\Local\Temp\661VL.exe"90⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\39M50.exe"C:\Users\Admin\AppData\Local\Temp\39M50.exe"91⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\09519.exe"C:\Users\Admin\AppData\Local\Temp\09519.exe"92⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\KVWNS.exe"C:\Users\Admin\AppData\Local\Temp\KVWNS.exe"93⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\PE987.exe"C:\Users\Admin\AppData\Local\Temp\PE987.exe"94⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\1LZUU.exe"C:\Users\Admin\AppData\Local\Temp\1LZUU.exe"95⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\94029.exe"C:\Users\Admin\AppData\Local\Temp\94029.exe"96⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\51K9V.exe"C:\Users\Admin\AppData\Local\Temp\51K9V.exe"97⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\JA4WB.exe"C:\Users\Admin\AppData\Local\Temp\JA4WB.exe"98⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\PJO56.exe"C:\Users\Admin\AppData\Local\Temp\PJO56.exe"99⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\AEQEI.exe"C:\Users\Admin\AppData\Local\Temp\AEQEI.exe"100⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\60VH2.exe"C:\Users\Admin\AppData\Local\Temp\60VH2.exe"101⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\1387K.exe"C:\Users\Admin\AppData\Local\Temp\1387K.exe"102⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\3RVYW.exe"C:\Users\Admin\AppData\Local\Temp\3RVYW.exe"103⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\8G131.exe"C:\Users\Admin\AppData\Local\Temp\8G131.exe"104⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\9N3GD.exe"C:\Users\Admin\AppData\Local\Temp\9N3GD.exe"105⤵
- Checks computer location settings
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\V040J.exe"C:\Users\Admin\AppData\Local\Temp\V040J.exe"106⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\A8O61.exe"C:\Users\Admin\AppData\Local\Temp\A8O61.exe"107⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\LPIJQ.exe"C:\Users\Admin\AppData\Local\Temp\LPIJQ.exe"108⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\NC0N4.exe"C:\Users\Admin\AppData\Local\Temp\NC0N4.exe"109⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\V6II8.exe"C:\Users\Admin\AppData\Local\Temp\V6II8.exe"110⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\F548I.exe"C:\Users\Admin\AppData\Local\Temp\F548I.exe"111⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\8GQH8.exe"C:\Users\Admin\AppData\Local\Temp\8GQH8.exe"112⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\WZH5N.exe"C:\Users\Admin\AppData\Local\Temp\WZH5N.exe"113⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\U3FHT.exe"C:\Users\Admin\AppData\Local\Temp\U3FHT.exe"114⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\23115.exe"C:\Users\Admin\AppData\Local\Temp\23115.exe"115⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\0T5PA.exe"C:\Users\Admin\AppData\Local\Temp\0T5PA.exe"116⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\9HP28.exe"C:\Users\Admin\AppData\Local\Temp\9HP28.exe"117⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\719O2.exe"C:\Users\Admin\AppData\Local\Temp\719O2.exe"118⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\VT6GU.exe"C:\Users\Admin\AppData\Local\Temp\VT6GU.exe"119⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\X125F.exe"C:\Users\Admin\AppData\Local\Temp\X125F.exe"120⤵
- Checks computer location settings
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\6ERBT.exe"C:\Users\Admin\AppData\Local\Temp\6ERBT.exe"121⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\39F4W.exe"C:\Users\Admin\AppData\Local\Temp\39F4W.exe"122⤵PID:4256
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-