Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 05:43
Static task
static1
Behavioral task
behavioral1
Sample
8da7fa0137a085abce43d26397705430_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8da7fa0137a085abce43d26397705430_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
8da7fa0137a085abce43d26397705430_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
8da7fa0137a085abce43d26397705430
-
SHA1
11813df913bc67c6232a316579864885af472a7d
-
SHA256
8f860ee6af1353ae0cc08ef7aa07279562baef40b6f16cf7e2f7abe49019955c
-
SHA512
3e5091d4865063d6d22a6a12ccdcc2896aa590bc4babe9ddd4748c7d635e308b99ef69339c4fe624ec52952dc61d4a55a501c25e426af8b08c6c7758026c1ed8
-
SSDEEP
24576:1qylFH50Dv6RwyeQvt6ot0h9HyrOgiruAG:IylFHUv6ReIt0jSrOo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation K3FJ5.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 3Z8KY.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 60NT7.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 5ORJM.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 0LX11.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 5ZY47.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 1I46M.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 3QC8J.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation AZS29.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation G0Q0T.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation F6G1S.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation S3D9R.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation RMAUX.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation U173Y.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C37YK.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation GIVI2.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 047PG.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C7A97.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation WU9Q4.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 0AC45.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation M0V43.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 5A02D.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 3EX2S.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation VWME4.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 007XE.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation R4M5F.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 63F32.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation EEB05.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation OD3AG.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 871VZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 13C53.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation GT7U4.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 1F5CE.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 374P3.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 22RUH.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation IS9O8.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation XFD5N.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 1S5J2.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation N9DK5.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation KJ5F5.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 7PW6P.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 2V6TZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Q6MT1.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 9ABE8.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 79UUB.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C6CB9.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation K5358.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation SA4UC.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation DJKIB.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation CW3Q2.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation B033R.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Q4DE0.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C8V58.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Z27X5.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 2OU0S.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Y1NFU.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation NB1N0.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation T46E1.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation NP202.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation HFRUY.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 4O4TR.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 7MC93.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation R2QQ0.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation X683G.exe -
Executes dropped EXE 64 IoCs
pid Process 1560 S4I85.exe 408 MZI1E.exe 4448 VWME4.exe 4576 6SR3T.exe 4640 3OND5.exe 4692 87L2V.exe 4624 TU581.exe 3012 F4UF6.exe 804 Q0T15.exe 1180 UA400.exe 5068 DX66Y.exe 1848 R8282.exe 1728 13CJE.exe 2120 4Y7U9.exe 3556 676P5.exe 4832 37OB3.exe 1272 OK1DS.exe 2596 5F2H6.exe 3720 774G5.exe 4436 G9WPX.exe 2428 LGT78.exe 4512 IV940.exe 3292 1I46M.exe 1212 5B782.exe 3164 WBILJ.exe 4784 U11R4.exe 3844 69IC8.exe 1580 Y381B.exe 3060 96W49.exe 536 CK249.exe 956 K3FJ5.exe 636 9NB10.exe 3276 C37YK.exe 3244 C326N.exe 1936 S91D8.exe 1388 228VG.exe 668 4P972.exe 208 MBK48.exe 4980 D4E78.exe 3068 LJ298.exe 768 36O1D.exe 5024 P738S.exe 4448 35LU4.exe 3992 F3LBE.exe 4512 246T5.exe 4688 Z1861.exe 2580 770DM.exe 3044 1GY04.exe 1760 V27U8.exe 3012 ZPF0I.exe 3428 HD9Z3.exe 3948 GIVI2.exe 3060 3QC8J.exe 2692 2X914.exe 2320 P345O.exe 548 998J6.exe 1512 3WH6B.exe 2960 AZS29.exe 4908 I1D0L.exe 2660 22RUH.exe 2948 EEB05.exe 2892 Q1317.exe 4168 295E1.exe 3776 T0VN9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 724 8da7fa0137a085abce43d26397705430_NeikiAnalytics.exe 724 8da7fa0137a085abce43d26397705430_NeikiAnalytics.exe 1560 S4I85.exe 1560 S4I85.exe 408 MZI1E.exe 408 MZI1E.exe 4448 VWME4.exe 4448 VWME4.exe 4576 6SR3T.exe 4576 6SR3T.exe 4640 3OND5.exe 4640 3OND5.exe 4692 87L2V.exe 4692 87L2V.exe 4624 TU581.exe 4624 TU581.exe 3012 F4UF6.exe 3012 F4UF6.exe 804 Q0T15.exe 804 Q0T15.exe 1180 UA400.exe 1180 UA400.exe 5068 DX66Y.exe 5068 DX66Y.exe 1848 R8282.exe 1848 R8282.exe 1728 13CJE.exe 1728 13CJE.exe 2120 4Y7U9.exe 2120 4Y7U9.exe 3556 676P5.exe 3556 676P5.exe 4832 37OB3.exe 4832 37OB3.exe 1272 OK1DS.exe 1272 OK1DS.exe 2596 5F2H6.exe 2596 5F2H6.exe 3720 774G5.exe 3720 774G5.exe 4436 G9WPX.exe 4436 G9WPX.exe 2428 LGT78.exe 2428 LGT78.exe 4512 IV940.exe 4512 IV940.exe 3292 1I46M.exe 3292 1I46M.exe 1212 5B782.exe 1212 5B782.exe 3164 WBILJ.exe 3164 WBILJ.exe 4784 U11R4.exe 4784 U11R4.exe 3844 69IC8.exe 3844 69IC8.exe 1580 Y381B.exe 1580 Y381B.exe 3060 96W49.exe 3060 96W49.exe 536 CK249.exe 536 CK249.exe 956 K3FJ5.exe 956 K3FJ5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 724 wrote to memory of 1560 724 8da7fa0137a085abce43d26397705430_NeikiAnalytics.exe 82 PID 724 wrote to memory of 1560 724 8da7fa0137a085abce43d26397705430_NeikiAnalytics.exe 82 PID 724 wrote to memory of 1560 724 8da7fa0137a085abce43d26397705430_NeikiAnalytics.exe 82 PID 1560 wrote to memory of 408 1560 S4I85.exe 85 PID 1560 wrote to memory of 408 1560 S4I85.exe 85 PID 1560 wrote to memory of 408 1560 S4I85.exe 85 PID 408 wrote to memory of 4448 408 MZI1E.exe 87 PID 408 wrote to memory of 4448 408 MZI1E.exe 87 PID 408 wrote to memory of 4448 408 MZI1E.exe 87 PID 4448 wrote to memory of 4576 4448 VWME4.exe 88 PID 4448 wrote to memory of 4576 4448 VWME4.exe 88 PID 4448 wrote to memory of 4576 4448 VWME4.exe 88 PID 4576 wrote to memory of 4640 4576 6SR3T.exe 89 PID 4576 wrote to memory of 4640 4576 6SR3T.exe 89 PID 4576 wrote to memory of 4640 4576 6SR3T.exe 89 PID 4640 wrote to memory of 4692 4640 3OND5.exe 90 PID 4640 wrote to memory of 4692 4640 3OND5.exe 90 PID 4640 wrote to memory of 4692 4640 3OND5.exe 90 PID 4692 wrote to memory of 4624 4692 87L2V.exe 91 PID 4692 wrote to memory of 4624 4692 87L2V.exe 91 PID 4692 wrote to memory of 4624 4692 87L2V.exe 91 PID 4624 wrote to memory of 3012 4624 TU581.exe 93 PID 4624 wrote to memory of 3012 4624 TU581.exe 93 PID 4624 wrote to memory of 3012 4624 TU581.exe 93 PID 3012 wrote to memory of 804 3012 F4UF6.exe 95 PID 3012 wrote to memory of 804 3012 F4UF6.exe 95 PID 3012 wrote to memory of 804 3012 F4UF6.exe 95 PID 804 wrote to memory of 1180 804 Q0T15.exe 96 PID 804 wrote to memory of 1180 804 Q0T15.exe 96 PID 804 wrote to memory of 1180 804 Q0T15.exe 96 PID 1180 wrote to memory of 5068 1180 UA400.exe 97 PID 1180 wrote to memory of 5068 1180 UA400.exe 97 PID 1180 wrote to memory of 5068 1180 UA400.exe 97 PID 5068 wrote to memory of 1848 5068 DX66Y.exe 98 PID 5068 wrote to memory of 1848 5068 DX66Y.exe 98 PID 5068 wrote to memory of 1848 5068 DX66Y.exe 98 PID 1848 wrote to memory of 1728 1848 R8282.exe 100 PID 1848 wrote to memory of 1728 1848 R8282.exe 100 PID 1848 wrote to memory of 1728 1848 R8282.exe 100 PID 1728 wrote to memory of 2120 1728 13CJE.exe 101 PID 1728 wrote to memory of 2120 1728 13CJE.exe 101 PID 1728 wrote to memory of 2120 1728 13CJE.exe 101 PID 2120 wrote to memory of 3556 2120 4Y7U9.exe 102 PID 2120 wrote to memory of 3556 2120 4Y7U9.exe 102 PID 2120 wrote to memory of 3556 2120 4Y7U9.exe 102 PID 3556 wrote to memory of 4832 3556 676P5.exe 103 PID 3556 wrote to memory of 4832 3556 676P5.exe 103 PID 3556 wrote to memory of 4832 3556 676P5.exe 103 PID 4832 wrote to memory of 1272 4832 37OB3.exe 104 PID 4832 wrote to memory of 1272 4832 37OB3.exe 104 PID 4832 wrote to memory of 1272 4832 37OB3.exe 104 PID 1272 wrote to memory of 2596 1272 OK1DS.exe 105 PID 1272 wrote to memory of 2596 1272 OK1DS.exe 105 PID 1272 wrote to memory of 2596 1272 OK1DS.exe 105 PID 2596 wrote to memory of 3720 2596 5F2H6.exe 106 PID 2596 wrote to memory of 3720 2596 5F2H6.exe 106 PID 2596 wrote to memory of 3720 2596 5F2H6.exe 106 PID 3720 wrote to memory of 4436 3720 774G5.exe 107 PID 3720 wrote to memory of 4436 3720 774G5.exe 107 PID 3720 wrote to memory of 4436 3720 774G5.exe 107 PID 4436 wrote to memory of 2428 4436 G9WPX.exe 108 PID 4436 wrote to memory of 2428 4436 G9WPX.exe 108 PID 4436 wrote to memory of 2428 4436 G9WPX.exe 108 PID 2428 wrote to memory of 4512 2428 LGT78.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\8da7fa0137a085abce43d26397705430_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8da7fa0137a085abce43d26397705430_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\S4I85.exe"C:\Users\Admin\AppData\Local\Temp\S4I85.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\MZI1E.exe"C:\Users\Admin\AppData\Local\Temp\MZI1E.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\VWME4.exe"C:\Users\Admin\AppData\Local\Temp\VWME4.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\6SR3T.exe"C:\Users\Admin\AppData\Local\Temp\6SR3T.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\3OND5.exe"C:\Users\Admin\AppData\Local\Temp\3OND5.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\87L2V.exe"C:\Users\Admin\AppData\Local\Temp\87L2V.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\TU581.exe"C:\Users\Admin\AppData\Local\Temp\TU581.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\F4UF6.exe"C:\Users\Admin\AppData\Local\Temp\F4UF6.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\Q0T15.exe"C:\Users\Admin\AppData\Local\Temp\Q0T15.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Local\Temp\UA400.exe"C:\Users\Admin\AppData\Local\Temp\UA400.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\DX66Y.exe"C:\Users\Admin\AppData\Local\Temp\DX66Y.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\R8282.exe"C:\Users\Admin\AppData\Local\Temp\R8282.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\13CJE.exe"C:\Users\Admin\AppData\Local\Temp\13CJE.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\4Y7U9.exe"C:\Users\Admin\AppData\Local\Temp\4Y7U9.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\676P5.exe"C:\Users\Admin\AppData\Local\Temp\676P5.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\37OB3.exe"C:\Users\Admin\AppData\Local\Temp\37OB3.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\OK1DS.exe"C:\Users\Admin\AppData\Local\Temp\OK1DS.exe"18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\5F2H6.exe"C:\Users\Admin\AppData\Local\Temp\5F2H6.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\774G5.exe"C:\Users\Admin\AppData\Local\Temp\774G5.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\G9WPX.exe"C:\Users\Admin\AppData\Local\Temp\G9WPX.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\LGT78.exe"C:\Users\Admin\AppData\Local\Temp\LGT78.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IV940.exe"C:\Users\Admin\AppData\Local\Temp\IV940.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\1I46M.exe"C:\Users\Admin\AppData\Local\Temp\1I46M.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\5B782.exe"C:\Users\Admin\AppData\Local\Temp\5B782.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\WBILJ.exe"C:\Users\Admin\AppData\Local\Temp\WBILJ.exe"26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\U11R4.exe"C:\Users\Admin\AppData\Local\Temp\U11R4.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\69IC8.exe"C:\Users\Admin\AppData\Local\Temp\69IC8.exe"28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\Y381B.exe"C:\Users\Admin\AppData\Local\Temp\Y381B.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\96W49.exe"C:\Users\Admin\AppData\Local\Temp\96W49.exe"30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\CK249.exe"C:\Users\Admin\AppData\Local\Temp\CK249.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:536 -
C:\Users\Admin\AppData\Local\Temp\K3FJ5.exe"C:\Users\Admin\AppData\Local\Temp\K3FJ5.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:956 -
C:\Users\Admin\AppData\Local\Temp\9NB10.exe"C:\Users\Admin\AppData\Local\Temp\9NB10.exe"33⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\C37YK.exe"C:\Users\Admin\AppData\Local\Temp\C37YK.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\C326N.exe"C:\Users\Admin\AppData\Local\Temp\C326N.exe"35⤵
- Executes dropped EXE
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\S91D8.exe"C:\Users\Admin\AppData\Local\Temp\S91D8.exe"36⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\228VG.exe"C:\Users\Admin\AppData\Local\Temp\228VG.exe"37⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\4P972.exe"C:\Users\Admin\AppData\Local\Temp\4P972.exe"38⤵
- Executes dropped EXE
PID:668 -
C:\Users\Admin\AppData\Local\Temp\MBK48.exe"C:\Users\Admin\AppData\Local\Temp\MBK48.exe"39⤵
- Executes dropped EXE
PID:208 -
C:\Users\Admin\AppData\Local\Temp\D4E78.exe"C:\Users\Admin\AppData\Local\Temp\D4E78.exe"40⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\LJ298.exe"C:\Users\Admin\AppData\Local\Temp\LJ298.exe"41⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\36O1D.exe"C:\Users\Admin\AppData\Local\Temp\36O1D.exe"42⤵
- Executes dropped EXE
PID:768 -
C:\Users\Admin\AppData\Local\Temp\P738S.exe"C:\Users\Admin\AppData\Local\Temp\P738S.exe"43⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\35LU4.exe"C:\Users\Admin\AppData\Local\Temp\35LU4.exe"44⤵
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\F3LBE.exe"C:\Users\Admin\AppData\Local\Temp\F3LBE.exe"45⤵
- Executes dropped EXE
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\246T5.exe"C:\Users\Admin\AppData\Local\Temp\246T5.exe"46⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\Z1861.exe"C:\Users\Admin\AppData\Local\Temp\Z1861.exe"47⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\770DM.exe"C:\Users\Admin\AppData\Local\Temp\770DM.exe"48⤵
- Executes dropped EXE
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\1GY04.exe"C:\Users\Admin\AppData\Local\Temp\1GY04.exe"49⤵
- Executes dropped EXE
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\V27U8.exe"C:\Users\Admin\AppData\Local\Temp\V27U8.exe"50⤵
- Executes dropped EXE
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\ZPF0I.exe"C:\Users\Admin\AppData\Local\Temp\ZPF0I.exe"51⤵
- Executes dropped EXE
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\HD9Z3.exe"C:\Users\Admin\AppData\Local\Temp\HD9Z3.exe"52⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\GIVI2.exe"C:\Users\Admin\AppData\Local\Temp\GIVI2.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\3QC8J.exe"C:\Users\Admin\AppData\Local\Temp\3QC8J.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\2X914.exe"C:\Users\Admin\AppData\Local\Temp\2X914.exe"55⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\P345O.exe"C:\Users\Admin\AppData\Local\Temp\P345O.exe"56⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\998J6.exe"C:\Users\Admin\AppData\Local\Temp\998J6.exe"57⤵
- Executes dropped EXE
PID:548 -
C:\Users\Admin\AppData\Local\Temp\3WH6B.exe"C:\Users\Admin\AppData\Local\Temp\3WH6B.exe"58⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\AZS29.exe"C:\Users\Admin\AppData\Local\Temp\AZS29.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\I1D0L.exe"C:\Users\Admin\AppData\Local\Temp\I1D0L.exe"60⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\22RUH.exe"C:\Users\Admin\AppData\Local\Temp\22RUH.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\EEB05.exe"C:\Users\Admin\AppData\Local\Temp\EEB05.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\Q1317.exe"C:\Users\Admin\AppData\Local\Temp\Q1317.exe"63⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\295E1.exe"C:\Users\Admin\AppData\Local\Temp\295E1.exe"64⤵
- Executes dropped EXE
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\T0VN9.exe"C:\Users\Admin\AppData\Local\Temp\T0VN9.exe"65⤵
- Executes dropped EXE
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\3BMP9.exe"C:\Users\Admin\AppData\Local\Temp\3BMP9.exe"66⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\Z27X5.exe"C:\Users\Admin\AppData\Local\Temp\Z27X5.exe"67⤵
- Checks computer location settings
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\68CG3.exe"C:\Users\Admin\AppData\Local\Temp\68CG3.exe"68⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\FP837.exe"C:\Users\Admin\AppData\Local\Temp\FP837.exe"69⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\ZZ6J0.exe"C:\Users\Admin\AppData\Local\Temp\ZZ6J0.exe"70⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\0B44S.exe"C:\Users\Admin\AppData\Local\Temp\0B44S.exe"71⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\PSL7N.exe"C:\Users\Admin\AppData\Local\Temp\PSL7N.exe"72⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\D54M3.exe"C:\Users\Admin\AppData\Local\Temp\D54M3.exe"73⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\96CTI.exe"C:\Users\Admin\AppData\Local\Temp\96CTI.exe"74⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\CUU0R.exe"C:\Users\Admin\AppData\Local\Temp\CUU0R.exe"75⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\1XFO0.exe"C:\Users\Admin\AppData\Local\Temp\1XFO0.exe"76⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\G0Q0T.exe"C:\Users\Admin\AppData\Local\Temp\G0Q0T.exe"77⤵
- Checks computer location settings
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\0U5J1.exe"C:\Users\Admin\AppData\Local\Temp\0U5J1.exe"78⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\QC7QI.exe"C:\Users\Admin\AppData\Local\Temp\QC7QI.exe"79⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\IS9O8.exe"C:\Users\Admin\AppData\Local\Temp\IS9O8.exe"80⤵
- Checks computer location settings
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\2OU0S.exe"C:\Users\Admin\AppData\Local\Temp\2OU0S.exe"81⤵
- Checks computer location settings
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\6FUM2.exe"C:\Users\Admin\AppData\Local\Temp\6FUM2.exe"82⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\8S05C.exe"C:\Users\Admin\AppData\Local\Temp\8S05C.exe"83⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\QR7K5.exe"C:\Users\Admin\AppData\Local\Temp\QR7K5.exe"84⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\XFD5N.exe"C:\Users\Admin\AppData\Local\Temp\XFD5N.exe"85⤵
- Checks computer location settings
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\20L24.exe"C:\Users\Admin\AppData\Local\Temp\20L24.exe"86⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\Y1NFU.exe"C:\Users\Admin\AppData\Local\Temp\Y1NFU.exe"87⤵
- Checks computer location settings
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\O21X8.exe"C:\Users\Admin\AppData\Local\Temp\O21X8.exe"88⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\O062S.exe"C:\Users\Admin\AppData\Local\Temp\O062S.exe"89⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\LG9OZ.exe"C:\Users\Admin\AppData\Local\Temp\LG9OZ.exe"90⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\29W9P.exe"C:\Users\Admin\AppData\Local\Temp\29W9P.exe"91⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\047PG.exe"C:\Users\Admin\AppData\Local\Temp\047PG.exe"92⤵
- Checks computer location settings
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\V41WH.exe"C:\Users\Admin\AppData\Local\Temp\V41WH.exe"93⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\OD3AG.exe"C:\Users\Admin\AppData\Local\Temp\OD3AG.exe"94⤵
- Checks computer location settings
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\T3H71.exe"C:\Users\Admin\AppData\Local\Temp\T3H71.exe"95⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\887CE.exe"C:\Users\Admin\AppData\Local\Temp\887CE.exe"96⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\007XE.exe"C:\Users\Admin\AppData\Local\Temp\007XE.exe"97⤵
- Checks computer location settings
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\FK9E8.exe"C:\Users\Admin\AppData\Local\Temp\FK9E8.exe"98⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\W7W7X.exe"C:\Users\Admin\AppData\Local\Temp\W7W7X.exe"99⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\CY0C6.exe"C:\Users\Admin\AppData\Local\Temp\CY0C6.exe"100⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\16W4C.exe"C:\Users\Admin\AppData\Local\Temp\16W4C.exe"101⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\5LFI0.exe"C:\Users\Admin\AppData\Local\Temp\5LFI0.exe"102⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\V5WYR.exe"C:\Users\Admin\AppData\Local\Temp\V5WYR.exe"103⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\VKMF7.exe"C:\Users\Admin\AppData\Local\Temp\VKMF7.exe"104⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\H3LFN.exe"C:\Users\Admin\AppData\Local\Temp\H3LFN.exe"105⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\S1CX9.exe"C:\Users\Admin\AppData\Local\Temp\S1CX9.exe"106⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\B5H67.exe"C:\Users\Admin\AppData\Local\Temp\B5H67.exe"107⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\79E1K.exe"C:\Users\Admin\AppData\Local\Temp\79E1K.exe"108⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\2D022.exe"C:\Users\Admin\AppData\Local\Temp\2D022.exe"109⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\9A2DS.exe"C:\Users\Admin\AppData\Local\Temp\9A2DS.exe"110⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\Q6MT1.exe"C:\Users\Admin\AppData\Local\Temp\Q6MT1.exe"111⤵
- Checks computer location settings
PID:768 -
C:\Users\Admin\AppData\Local\Temp\15X8H.exe"C:\Users\Admin\AppData\Local\Temp\15X8H.exe"112⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\C7A97.exe"C:\Users\Admin\AppData\Local\Temp\C7A97.exe"113⤵
- Checks computer location settings
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\1GKLA.exe"C:\Users\Admin\AppData\Local\Temp\1GKLA.exe"114⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\NP202.exe"C:\Users\Admin\AppData\Local\Temp\NP202.exe"115⤵
- Checks computer location settings
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\N97ZV.exe"C:\Users\Admin\AppData\Local\Temp\N97ZV.exe"116⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\WU9Q4.exe"C:\Users\Admin\AppData\Local\Temp\WU9Q4.exe"117⤵
- Checks computer location settings
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\70JYL.exe"C:\Users\Admin\AppData\Local\Temp\70JYL.exe"118⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\1GJ58.exe"C:\Users\Admin\AppData\Local\Temp\1GJ58.exe"119⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\G5UCL.exe"C:\Users\Admin\AppData\Local\Temp\G5UCL.exe"120⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\PG1D5.exe"C:\Users\Admin\AppData\Local\Temp\PG1D5.exe"121⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\X30IX.exe"C:\Users\Admin\AppData\Local\Temp\X30IX.exe"122⤵PID:856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-