Analysis
-
max time kernel
66s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 17:50
Behavioral task
behavioral1
Sample
0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe
-
Size
1.9MB
-
MD5
0a75c1de42a66de73e7598b250147f10
-
SHA1
272b2ba48549472bc60c1b8f65dc3a24b26dc28c
-
SHA256
81e69546a840e90689b3e07f78dffdf280dc4890cb0834fa5215b4abea940aaa
-
SHA512
e5a3217d43a52f1d0e4ca70a331aadba4080c7c049894d08469d71009b6e06b81bb5b513edaa2276e4f608eb367368dc3b4fa92cc19e9f068a0ae856b475bdeb
-
SSDEEP
49152:knw9oUUEEDlMrL6T33MnTx1vYtkjC8oTTd:kQUEEx
Malware Config
Signatures
-
XMRig Miner payload 48 IoCs
resource yara_rule behavioral2/memory/2024-25-0x00007FF7EA610000-0x00007FF7EAA01000-memory.dmp xmrig behavioral2/memory/4668-15-0x00007FF71E3E0000-0x00007FF71E7D1000-memory.dmp xmrig behavioral2/memory/2264-438-0x00007FF75B050000-0x00007FF75B441000-memory.dmp xmrig behavioral2/memory/4712-439-0x00007FF6B6460000-0x00007FF6B6851000-memory.dmp xmrig behavioral2/memory/4524-440-0x00007FF780320000-0x00007FF780711000-memory.dmp xmrig behavioral2/memory/512-441-0x00007FF675B10000-0x00007FF675F01000-memory.dmp xmrig behavioral2/memory/1956-442-0x00007FF79FDC0000-0x00007FF7A01B1000-memory.dmp xmrig behavioral2/memory/4228-455-0x00007FF691480000-0x00007FF691871000-memory.dmp xmrig behavioral2/memory/3056-474-0x00007FF66E7C0000-0x00007FF66EBB1000-memory.dmp xmrig behavioral2/memory/2380-508-0x00007FF754480000-0x00007FF754871000-memory.dmp xmrig behavioral2/memory/2868-531-0x00007FF65BB70000-0x00007FF65BF61000-memory.dmp xmrig behavioral2/memory/4772-540-0x00007FF75AD90000-0x00007FF75B181000-memory.dmp xmrig behavioral2/memory/4568-541-0x00007FF6E9CF0000-0x00007FF6EA0E1000-memory.dmp xmrig behavioral2/memory/3496-550-0x00007FF69F900000-0x00007FF69FCF1000-memory.dmp xmrig behavioral2/memory/1944-553-0x00007FF6FAC80000-0x00007FF6FB071000-memory.dmp xmrig behavioral2/memory/4264-551-0x00007FF7ECEA0000-0x00007FF7ED291000-memory.dmp xmrig behavioral2/memory/232-545-0x00007FF79E280000-0x00007FF79E671000-memory.dmp xmrig behavioral2/memory/1212-526-0x00007FF7742C0000-0x00007FF7746B1000-memory.dmp xmrig behavioral2/memory/908-491-0x00007FF7DBEC0000-0x00007FF7DC2B1000-memory.dmp xmrig behavioral2/memory/1504-482-0x00007FF713FE0000-0x00007FF7143D1000-memory.dmp xmrig behavioral2/memory/1440-477-0x00007FF7FCB60000-0x00007FF7FCF51000-memory.dmp xmrig behavioral2/memory/396-465-0x00007FF7D5090000-0x00007FF7D5481000-memory.dmp xmrig behavioral2/memory/3780-451-0x00007FF783840000-0x00007FF783C31000-memory.dmp xmrig behavioral2/memory/4572-443-0x00007FF7D21E0000-0x00007FF7D25D1000-memory.dmp xmrig behavioral2/memory/4668-2010-0x00007FF71E3E0000-0x00007FF71E7D1000-memory.dmp xmrig behavioral2/memory/2024-2012-0x00007FF7EA610000-0x00007FF7EAA01000-memory.dmp xmrig behavioral2/memory/4264-2016-0x00007FF7ECEA0000-0x00007FF7ED291000-memory.dmp xmrig behavioral2/memory/1944-2018-0x00007FF6FAC80000-0x00007FF6FB071000-memory.dmp xmrig behavioral2/memory/2264-2014-0x00007FF75B050000-0x00007FF75B441000-memory.dmp xmrig behavioral2/memory/4712-2020-0x00007FF6B6460000-0x00007FF6B6851000-memory.dmp xmrig behavioral2/memory/1956-2026-0x00007FF79FDC0000-0x00007FF7A01B1000-memory.dmp xmrig behavioral2/memory/4572-2028-0x00007FF7D21E0000-0x00007FF7D25D1000-memory.dmp xmrig behavioral2/memory/3780-2030-0x00007FF783840000-0x00007FF783C31000-memory.dmp xmrig behavioral2/memory/4228-2032-0x00007FF691480000-0x00007FF691871000-memory.dmp xmrig behavioral2/memory/512-2024-0x00007FF675B10000-0x00007FF675F01000-memory.dmp xmrig behavioral2/memory/4524-2023-0x00007FF780320000-0x00007FF780711000-memory.dmp xmrig behavioral2/memory/3056-2036-0x00007FF66E7C0000-0x00007FF66EBB1000-memory.dmp xmrig behavioral2/memory/908-2042-0x00007FF7DBEC0000-0x00007FF7DC2B1000-memory.dmp xmrig behavioral2/memory/2868-2046-0x00007FF65BB70000-0x00007FF65BF61000-memory.dmp xmrig behavioral2/memory/2380-2050-0x00007FF754480000-0x00007FF754871000-memory.dmp xmrig behavioral2/memory/4568-2054-0x00007FF6E9CF0000-0x00007FF6EA0E1000-memory.dmp xmrig behavioral2/memory/232-2052-0x00007FF79E280000-0x00007FF79E671000-memory.dmp xmrig behavioral2/memory/4772-2049-0x00007FF75AD90000-0x00007FF75B181000-memory.dmp xmrig behavioral2/memory/1212-2045-0x00007FF7742C0000-0x00007FF7746B1000-memory.dmp xmrig behavioral2/memory/1504-2040-0x00007FF713FE0000-0x00007FF7143D1000-memory.dmp xmrig behavioral2/memory/1440-2038-0x00007FF7FCB60000-0x00007FF7FCF51000-memory.dmp xmrig behavioral2/memory/396-2035-0x00007FF7D5090000-0x00007FF7D5481000-memory.dmp xmrig behavioral2/memory/3496-2080-0x00007FF69F900000-0x00007FF69FCF1000-memory.dmp xmrig -
Modifies Installed Components in the registry 2 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 64 IoCs
pid Process 4668 zfmQVul.exe 2024 hSfCclD.exe 4264 rQlPDpH.exe 2264 NSMuzUu.exe 1944 dtpdzXk.exe 4712 jzfPbWw.exe 4524 giMhdfA.exe 512 TjIFzbH.exe 1956 XjAfnTo.exe 4572 TUzTTdc.exe 3780 tzqooQC.exe 4228 YSBnQaA.exe 396 XHuFFdL.exe 3056 kphceux.exe 1440 FCdFbnB.exe 1504 IiARdTq.exe 908 xliGlTc.exe 2380 UTkLYNk.exe 1212 bjnPgQd.exe 2868 QauiNCb.exe 4772 bBedbEf.exe 4568 dXTKSmo.exe 232 ZoUYrrX.exe 3496 EOYTttc.exe 3364 tRUXXDo.exe 1812 tMSsjDV.exe 228 QxyqCsX.exe 664 iNaYtHz.exe 4844 NZiSfBx.exe 928 FPOonea.exe 3384 UnGnTRj.exe 3224 DlPhVJa.exe 2580 fbSUejN.exe 5056 kanrLsb.exe 2568 KzGpIZQ.exe 1508 zRAMjiQ.exe 1428 NOSWljk.exe 3468 RFPDUmX.exe 2028 LgNLLgQ.exe 556 jIpXYwI.exe 4244 wEWZMtR.exe 2096 dFFDbIH.exe 4744 DySZcjH.exe 4548 vxEQnkB.exe 3572 kZIjxkm.exe 960 DZXKSAd.exe 4968 nmnDHTJ.exe 2956 HUVcSQh.exe 3380 yAetYEc.exe 3460 lGwJacj.exe 1636 YFuVpxr.exe 1912 xAMKYEO.exe 3484 EayAvZC.exe 2736 wDUUMAG.exe 2644 ZqbmTlM.exe 3308 ZeBNFsx.exe 1028 FRtTQBY.exe 3508 MkuZQhR.exe 4752 RQdsYeC.exe 1968 TjDYwJe.exe 4392 PezRFzT.exe 4920 BQpHZNT.exe 2832 fWQbtHy.exe 2528 PjvWkCU.exe -
resource yara_rule behavioral2/memory/1196-0-0x00007FF635CA0000-0x00007FF636091000-memory.dmp upx behavioral2/files/0x000c0000000233be-6.dat upx behavioral2/files/0x0009000000023409-9.dat upx behavioral2/files/0x000800000002340a-16.dat upx behavioral2/files/0x000700000002340b-20.dat upx behavioral2/files/0x000700000002340d-32.dat upx behavioral2/files/0x000700000002340e-35.dat upx behavioral2/files/0x000700000002340f-40.dat upx behavioral2/files/0x0007000000023410-45.dat upx behavioral2/files/0x0007000000023411-50.dat upx behavioral2/files/0x0007000000023412-58.dat upx behavioral2/files/0x0007000000023413-63.dat upx behavioral2/files/0x0007000000023415-72.dat upx behavioral2/files/0x0007000000023416-78.dat upx behavioral2/files/0x0007000000023418-88.dat upx behavioral2/files/0x000700000002341a-98.dat upx behavioral2/files/0x000700000002341b-103.dat upx behavioral2/files/0x000700000002341e-117.dat upx behavioral2/files/0x0007000000023420-131.dat upx behavioral2/files/0x0007000000023427-163.dat upx behavioral2/files/0x0007000000023426-161.dat upx behavioral2/files/0x0007000000023425-153.dat upx behavioral2/files/0x0007000000023424-148.dat upx behavioral2/files/0x0007000000023423-146.dat upx behavioral2/files/0x0007000000023422-138.dat upx behavioral2/files/0x0007000000023421-136.dat upx behavioral2/files/0x000700000002341f-123.dat upx behavioral2/files/0x000700000002341d-113.dat upx behavioral2/files/0x000700000002341c-108.dat upx behavioral2/files/0x0007000000023419-93.dat upx behavioral2/files/0x0007000000023417-83.dat upx behavioral2/files/0x0007000000023414-68.dat upx behavioral2/files/0x000700000002340c-28.dat upx behavioral2/memory/2024-25-0x00007FF7EA610000-0x00007FF7EAA01000-memory.dmp upx behavioral2/memory/4668-15-0x00007FF71E3E0000-0x00007FF71E7D1000-memory.dmp upx behavioral2/memory/2264-438-0x00007FF75B050000-0x00007FF75B441000-memory.dmp upx behavioral2/memory/4712-439-0x00007FF6B6460000-0x00007FF6B6851000-memory.dmp upx behavioral2/memory/4524-440-0x00007FF780320000-0x00007FF780711000-memory.dmp upx behavioral2/memory/512-441-0x00007FF675B10000-0x00007FF675F01000-memory.dmp upx behavioral2/memory/1956-442-0x00007FF79FDC0000-0x00007FF7A01B1000-memory.dmp upx behavioral2/memory/4228-455-0x00007FF691480000-0x00007FF691871000-memory.dmp upx behavioral2/memory/3056-474-0x00007FF66E7C0000-0x00007FF66EBB1000-memory.dmp upx behavioral2/memory/2380-508-0x00007FF754480000-0x00007FF754871000-memory.dmp upx behavioral2/memory/2868-531-0x00007FF65BB70000-0x00007FF65BF61000-memory.dmp upx behavioral2/memory/4772-540-0x00007FF75AD90000-0x00007FF75B181000-memory.dmp upx behavioral2/memory/4568-541-0x00007FF6E9CF0000-0x00007FF6EA0E1000-memory.dmp upx behavioral2/memory/3496-550-0x00007FF69F900000-0x00007FF69FCF1000-memory.dmp upx behavioral2/memory/1944-553-0x00007FF6FAC80000-0x00007FF6FB071000-memory.dmp upx behavioral2/memory/4264-551-0x00007FF7ECEA0000-0x00007FF7ED291000-memory.dmp upx behavioral2/memory/232-545-0x00007FF79E280000-0x00007FF79E671000-memory.dmp upx behavioral2/memory/1212-526-0x00007FF7742C0000-0x00007FF7746B1000-memory.dmp upx behavioral2/memory/908-491-0x00007FF7DBEC0000-0x00007FF7DC2B1000-memory.dmp upx behavioral2/memory/1504-482-0x00007FF713FE0000-0x00007FF7143D1000-memory.dmp upx behavioral2/memory/1440-477-0x00007FF7FCB60000-0x00007FF7FCF51000-memory.dmp upx behavioral2/memory/396-465-0x00007FF7D5090000-0x00007FF7D5481000-memory.dmp upx behavioral2/memory/3780-451-0x00007FF783840000-0x00007FF783C31000-memory.dmp upx behavioral2/memory/4572-443-0x00007FF7D21E0000-0x00007FF7D25D1000-memory.dmp upx behavioral2/memory/4668-2010-0x00007FF71E3E0000-0x00007FF71E7D1000-memory.dmp upx behavioral2/memory/2024-2012-0x00007FF7EA610000-0x00007FF7EAA01000-memory.dmp upx behavioral2/memory/4264-2016-0x00007FF7ECEA0000-0x00007FF7ED291000-memory.dmp upx behavioral2/memory/1944-2018-0x00007FF6FAC80000-0x00007FF6FB071000-memory.dmp upx behavioral2/memory/2264-2014-0x00007FF75B050000-0x00007FF75B441000-memory.dmp upx behavioral2/memory/4712-2020-0x00007FF6B6460000-0x00007FF6B6851000-memory.dmp upx behavioral2/memory/1956-2026-0x00007FF79FDC0000-0x00007FF7A01B1000-memory.dmp upx -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\System32\OpKimcO.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\OVTqcih.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\UQAdxBs.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\eXqblWQ.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\sGPrevF.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\PgbuegA.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\uSpexrI.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\FIMLAUk.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\BWukmFj.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\qBKSSus.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\tegthRc.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\zYbJcHM.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\yXCpzFg.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\lGwJacj.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\QkWnpmz.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\TnNgxYe.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\xuGnBZW.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\BGFGxST.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\itvCQWu.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\CNbxiIJ.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\deijDWY.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\mqcKWPi.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\DCMuBKj.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\YYrLgun.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\iZoJNJb.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\NSMuzUu.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\iztfxRa.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\UFIVGPv.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\vAxEqAz.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\CCKWxiC.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\vmRVHDf.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\RgMzRMa.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\rzHraKG.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\PezRFzT.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\OjVPQFr.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\FqwqkwB.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\zJZHjVr.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\iNPDhbo.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\tgOWtwk.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\UEjLMBp.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\LaMFvNe.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\zQkZLNJ.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\YLOMMQY.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\nGQLqZw.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\OhRPQsE.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\RlCVTbv.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\YJRErVg.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\YbWjQPi.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\uWSSckV.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\EMRNnIW.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\iPPQHUj.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\AthyOih.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\kWGdodI.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\qdaCjmj.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\MzHIagB.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\dIhpPwT.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\DtIOVfF.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\NzZffeX.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\hIjOKUZ.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\SOjkfyY.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\YsixZUy.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\JdHvYPq.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\GUBxTvU.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe File created C:\Windows\System32\iBGFmGy.exe 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4124900551-4068476067-3491212533-1000\{8CF9D9AD-6C84-400B-882B-98C106776A48} explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 12900 explorer.exe Token: SeCreatePagefilePrivilege 12900 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe Token: SeShutdownPrivilege 456 explorer.exe Token: SeCreatePagefilePrivilege 456 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 13180 sihost.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 12900 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6264 explorer.exe 6072 explorer.exe 6072 explorer.exe 6072 explorer.exe 6072 explorer.exe 6072 explorer.exe 6072 explorer.exe 6072 explorer.exe 6072 explorer.exe 6072 explorer.exe 6072 explorer.exe 6072 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4140 StartMenuExperienceHost.exe 7448 StartMenuExperienceHost.exe 8176 StartMenuExperienceHost.exe 8472 SearchApp.exe 3620 StartMenuExperienceHost.exe 11164 StartMenuExperienceHost.exe 8120 SearchApp.exe 12872 StartMenuExperienceHost.exe 2736 SearchApp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1196 wrote to memory of 4668 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 82 PID 1196 wrote to memory of 4668 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 82 PID 1196 wrote to memory of 2024 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 83 PID 1196 wrote to memory of 2024 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 83 PID 1196 wrote to memory of 4264 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 84 PID 1196 wrote to memory of 4264 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 84 PID 1196 wrote to memory of 2264 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 85 PID 1196 wrote to memory of 2264 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 85 PID 1196 wrote to memory of 1944 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 86 PID 1196 wrote to memory of 1944 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 86 PID 1196 wrote to memory of 4712 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 87 PID 1196 wrote to memory of 4712 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 87 PID 1196 wrote to memory of 4524 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 88 PID 1196 wrote to memory of 4524 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 88 PID 1196 wrote to memory of 512 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 89 PID 1196 wrote to memory of 512 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 89 PID 1196 wrote to memory of 1956 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 90 PID 1196 wrote to memory of 1956 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 90 PID 1196 wrote to memory of 4572 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 91 PID 1196 wrote to memory of 4572 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 91 PID 1196 wrote to memory of 3780 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 92 PID 1196 wrote to memory of 3780 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 92 PID 1196 wrote to memory of 4228 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 93 PID 1196 wrote to memory of 4228 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 93 PID 1196 wrote to memory of 396 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 94 PID 1196 wrote to memory of 396 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 94 PID 1196 wrote to memory of 3056 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 95 PID 1196 wrote to memory of 3056 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 95 PID 1196 wrote to memory of 1440 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 96 PID 1196 wrote to memory of 1440 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 96 PID 1196 wrote to memory of 1504 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 97 PID 1196 wrote to memory of 1504 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 97 PID 1196 wrote to memory of 908 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 98 PID 1196 wrote to memory of 908 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 98 PID 1196 wrote to memory of 2380 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 99 PID 1196 wrote to memory of 2380 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 99 PID 1196 wrote to memory of 1212 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 100 PID 1196 wrote to memory of 1212 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 100 PID 1196 wrote to memory of 2868 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 101 PID 1196 wrote to memory of 2868 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 101 PID 1196 wrote to memory of 4772 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 102 PID 1196 wrote to memory of 4772 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 102 PID 1196 wrote to memory of 4568 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 103 PID 1196 wrote to memory of 4568 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 103 PID 1196 wrote to memory of 232 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 104 PID 1196 wrote to memory of 232 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 104 PID 1196 wrote to memory of 3496 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 105 PID 1196 wrote to memory of 3496 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 105 PID 1196 wrote to memory of 3364 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 106 PID 1196 wrote to memory of 3364 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 106 PID 1196 wrote to memory of 1812 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 107 PID 1196 wrote to memory of 1812 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 107 PID 1196 wrote to memory of 228 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 108 PID 1196 wrote to memory of 228 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 108 PID 1196 wrote to memory of 664 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 109 PID 1196 wrote to memory of 664 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 109 PID 1196 wrote to memory of 4844 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 110 PID 1196 wrote to memory of 4844 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 110 PID 1196 wrote to memory of 928 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 111 PID 1196 wrote to memory of 928 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 111 PID 1196 wrote to memory of 3384 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 112 PID 1196 wrote to memory of 3384 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 112 PID 1196 wrote to memory of 3224 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 113 PID 1196 wrote to memory of 3224 1196 0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0a75c1de42a66de73e7598b250147f10_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\System32\zfmQVul.exeC:\Windows\System32\zfmQVul.exe2⤵
- Executes dropped EXE
PID:4668
-
-
C:\Windows\System32\hSfCclD.exeC:\Windows\System32\hSfCclD.exe2⤵
- Executes dropped EXE
PID:2024
-
-
C:\Windows\System32\rQlPDpH.exeC:\Windows\System32\rQlPDpH.exe2⤵
- Executes dropped EXE
PID:4264
-
-
C:\Windows\System32\NSMuzUu.exeC:\Windows\System32\NSMuzUu.exe2⤵
- Executes dropped EXE
PID:2264
-
-
C:\Windows\System32\dtpdzXk.exeC:\Windows\System32\dtpdzXk.exe2⤵
- Executes dropped EXE
PID:1944
-
-
C:\Windows\System32\jzfPbWw.exeC:\Windows\System32\jzfPbWw.exe2⤵
- Executes dropped EXE
PID:4712
-
-
C:\Windows\System32\giMhdfA.exeC:\Windows\System32\giMhdfA.exe2⤵
- Executes dropped EXE
PID:4524
-
-
C:\Windows\System32\TjIFzbH.exeC:\Windows\System32\TjIFzbH.exe2⤵
- Executes dropped EXE
PID:512
-
-
C:\Windows\System32\XjAfnTo.exeC:\Windows\System32\XjAfnTo.exe2⤵
- Executes dropped EXE
PID:1956
-
-
C:\Windows\System32\TUzTTdc.exeC:\Windows\System32\TUzTTdc.exe2⤵
- Executes dropped EXE
PID:4572
-
-
C:\Windows\System32\tzqooQC.exeC:\Windows\System32\tzqooQC.exe2⤵
- Executes dropped EXE
PID:3780
-
-
C:\Windows\System32\YSBnQaA.exeC:\Windows\System32\YSBnQaA.exe2⤵
- Executes dropped EXE
PID:4228
-
-
C:\Windows\System32\XHuFFdL.exeC:\Windows\System32\XHuFFdL.exe2⤵
- Executes dropped EXE
PID:396
-
-
C:\Windows\System32\kphceux.exeC:\Windows\System32\kphceux.exe2⤵
- Executes dropped EXE
PID:3056
-
-
C:\Windows\System32\FCdFbnB.exeC:\Windows\System32\FCdFbnB.exe2⤵
- Executes dropped EXE
PID:1440
-
-
C:\Windows\System32\IiARdTq.exeC:\Windows\System32\IiARdTq.exe2⤵
- Executes dropped EXE
PID:1504
-
-
C:\Windows\System32\xliGlTc.exeC:\Windows\System32\xliGlTc.exe2⤵
- Executes dropped EXE
PID:908
-
-
C:\Windows\System32\UTkLYNk.exeC:\Windows\System32\UTkLYNk.exe2⤵
- Executes dropped EXE
PID:2380
-
-
C:\Windows\System32\bjnPgQd.exeC:\Windows\System32\bjnPgQd.exe2⤵
- Executes dropped EXE
PID:1212
-
-
C:\Windows\System32\QauiNCb.exeC:\Windows\System32\QauiNCb.exe2⤵
- Executes dropped EXE
PID:2868
-
-
C:\Windows\System32\bBedbEf.exeC:\Windows\System32\bBedbEf.exe2⤵
- Executes dropped EXE
PID:4772
-
-
C:\Windows\System32\dXTKSmo.exeC:\Windows\System32\dXTKSmo.exe2⤵
- Executes dropped EXE
PID:4568
-
-
C:\Windows\System32\ZoUYrrX.exeC:\Windows\System32\ZoUYrrX.exe2⤵
- Executes dropped EXE
PID:232
-
-
C:\Windows\System32\EOYTttc.exeC:\Windows\System32\EOYTttc.exe2⤵
- Executes dropped EXE
PID:3496
-
-
C:\Windows\System32\tRUXXDo.exeC:\Windows\System32\tRUXXDo.exe2⤵
- Executes dropped EXE
PID:3364
-
-
C:\Windows\System32\tMSsjDV.exeC:\Windows\System32\tMSsjDV.exe2⤵
- Executes dropped EXE
PID:1812
-
-
C:\Windows\System32\QxyqCsX.exeC:\Windows\System32\QxyqCsX.exe2⤵
- Executes dropped EXE
PID:228
-
-
C:\Windows\System32\iNaYtHz.exeC:\Windows\System32\iNaYtHz.exe2⤵
- Executes dropped EXE
PID:664
-
-
C:\Windows\System32\NZiSfBx.exeC:\Windows\System32\NZiSfBx.exe2⤵
- Executes dropped EXE
PID:4844
-
-
C:\Windows\System32\FPOonea.exeC:\Windows\System32\FPOonea.exe2⤵
- Executes dropped EXE
PID:928
-
-
C:\Windows\System32\UnGnTRj.exeC:\Windows\System32\UnGnTRj.exe2⤵
- Executes dropped EXE
PID:3384
-
-
C:\Windows\System32\DlPhVJa.exeC:\Windows\System32\DlPhVJa.exe2⤵
- Executes dropped EXE
PID:3224
-
-
C:\Windows\System32\fbSUejN.exeC:\Windows\System32\fbSUejN.exe2⤵
- Executes dropped EXE
PID:2580
-
-
C:\Windows\System32\kanrLsb.exeC:\Windows\System32\kanrLsb.exe2⤵
- Executes dropped EXE
PID:5056
-
-
C:\Windows\System32\KzGpIZQ.exeC:\Windows\System32\KzGpIZQ.exe2⤵
- Executes dropped EXE
PID:2568
-
-
C:\Windows\System32\zRAMjiQ.exeC:\Windows\System32\zRAMjiQ.exe2⤵
- Executes dropped EXE
PID:1508
-
-
C:\Windows\System32\NOSWljk.exeC:\Windows\System32\NOSWljk.exe2⤵
- Executes dropped EXE
PID:1428
-
-
C:\Windows\System32\RFPDUmX.exeC:\Windows\System32\RFPDUmX.exe2⤵
- Executes dropped EXE
PID:3468
-
-
C:\Windows\System32\LgNLLgQ.exeC:\Windows\System32\LgNLLgQ.exe2⤵
- Executes dropped EXE
PID:2028
-
-
C:\Windows\System32\jIpXYwI.exeC:\Windows\System32\jIpXYwI.exe2⤵
- Executes dropped EXE
PID:556
-
-
C:\Windows\System32\wEWZMtR.exeC:\Windows\System32\wEWZMtR.exe2⤵
- Executes dropped EXE
PID:4244
-
-
C:\Windows\System32\dFFDbIH.exeC:\Windows\System32\dFFDbIH.exe2⤵
- Executes dropped EXE
PID:2096
-
-
C:\Windows\System32\DySZcjH.exeC:\Windows\System32\DySZcjH.exe2⤵
- Executes dropped EXE
PID:4744
-
-
C:\Windows\System32\vxEQnkB.exeC:\Windows\System32\vxEQnkB.exe2⤵
- Executes dropped EXE
PID:4548
-
-
C:\Windows\System32\kZIjxkm.exeC:\Windows\System32\kZIjxkm.exe2⤵
- Executes dropped EXE
PID:3572
-
-
C:\Windows\System32\DZXKSAd.exeC:\Windows\System32\DZXKSAd.exe2⤵
- Executes dropped EXE
PID:960
-
-
C:\Windows\System32\nmnDHTJ.exeC:\Windows\System32\nmnDHTJ.exe2⤵
- Executes dropped EXE
PID:4968
-
-
C:\Windows\System32\HUVcSQh.exeC:\Windows\System32\HUVcSQh.exe2⤵
- Executes dropped EXE
PID:2956
-
-
C:\Windows\System32\yAetYEc.exeC:\Windows\System32\yAetYEc.exe2⤵
- Executes dropped EXE
PID:3380
-
-
C:\Windows\System32\lGwJacj.exeC:\Windows\System32\lGwJacj.exe2⤵
- Executes dropped EXE
PID:3460
-
-
C:\Windows\System32\YFuVpxr.exeC:\Windows\System32\YFuVpxr.exe2⤵
- Executes dropped EXE
PID:1636
-
-
C:\Windows\System32\xAMKYEO.exeC:\Windows\System32\xAMKYEO.exe2⤵
- Executes dropped EXE
PID:1912
-
-
C:\Windows\System32\EayAvZC.exeC:\Windows\System32\EayAvZC.exe2⤵
- Executes dropped EXE
PID:3484
-
-
C:\Windows\System32\wDUUMAG.exeC:\Windows\System32\wDUUMAG.exe2⤵
- Executes dropped EXE
PID:2736
-
-
C:\Windows\System32\ZqbmTlM.exeC:\Windows\System32\ZqbmTlM.exe2⤵
- Executes dropped EXE
PID:2644
-
-
C:\Windows\System32\ZeBNFsx.exeC:\Windows\System32\ZeBNFsx.exe2⤵
- Executes dropped EXE
PID:3308
-
-
C:\Windows\System32\FRtTQBY.exeC:\Windows\System32\FRtTQBY.exe2⤵
- Executes dropped EXE
PID:1028
-
-
C:\Windows\System32\MkuZQhR.exeC:\Windows\System32\MkuZQhR.exe2⤵
- Executes dropped EXE
PID:3508
-
-
C:\Windows\System32\RQdsYeC.exeC:\Windows\System32\RQdsYeC.exe2⤵
- Executes dropped EXE
PID:4752
-
-
C:\Windows\System32\TjDYwJe.exeC:\Windows\System32\TjDYwJe.exe2⤵
- Executes dropped EXE
PID:1968
-
-
C:\Windows\System32\PezRFzT.exeC:\Windows\System32\PezRFzT.exe2⤵
- Executes dropped EXE
PID:4392
-
-
C:\Windows\System32\BQpHZNT.exeC:\Windows\System32\BQpHZNT.exe2⤵
- Executes dropped EXE
PID:4920
-
-
C:\Windows\System32\fWQbtHy.exeC:\Windows\System32\fWQbtHy.exe2⤵
- Executes dropped EXE
PID:2832
-
-
C:\Windows\System32\PjvWkCU.exeC:\Windows\System32\PjvWkCU.exe2⤵
- Executes dropped EXE
PID:2528
-
-
C:\Windows\System32\GVsGkLB.exeC:\Windows\System32\GVsGkLB.exe2⤵PID:2980
-
-
C:\Windows\System32\DtIOVfF.exeC:\Windows\System32\DtIOVfF.exe2⤵PID:2280
-
-
C:\Windows\System32\dMMzvxt.exeC:\Windows\System32\dMMzvxt.exe2⤵PID:1744
-
-
C:\Windows\System32\AuenAuD.exeC:\Windows\System32\AuenAuD.exe2⤵PID:224
-
-
C:\Windows\System32\Apisgdb.exeC:\Windows\System32\Apisgdb.exe2⤵PID:3500
-
-
C:\Windows\System32\qZRAMQX.exeC:\Windows\System32\qZRAMQX.exe2⤵PID:2252
-
-
C:\Windows\System32\zvXVleA.exeC:\Windows\System32\zvXVleA.exe2⤵PID:528
-
-
C:\Windows\System32\dBEUGyv.exeC:\Windows\System32\dBEUGyv.exe2⤵PID:1156
-
-
C:\Windows\System32\dfPoLfh.exeC:\Windows\System32\dfPoLfh.exe2⤵PID:5112
-
-
C:\Windows\System32\OWtqSGV.exeC:\Windows\System32\OWtqSGV.exe2⤵PID:808
-
-
C:\Windows\System32\nXOzGob.exeC:\Windows\System32\nXOzGob.exe2⤵PID:4476
-
-
C:\Windows\System32\KdkxxMl.exeC:\Windows\System32\KdkxxMl.exe2⤵PID:4180
-
-
C:\Windows\System32\deijDWY.exeC:\Windows\System32\deijDWY.exe2⤵PID:4900
-
-
C:\Windows\System32\VlzzPdv.exeC:\Windows\System32\VlzzPdv.exe2⤵PID:1644
-
-
C:\Windows\System32\CWEXSis.exeC:\Windows\System32\CWEXSis.exe2⤵PID:1584
-
-
C:\Windows\System32\zWXRXoo.exeC:\Windows\System32\zWXRXoo.exe2⤵PID:1496
-
-
C:\Windows\System32\Pybyywu.exeC:\Windows\System32\Pybyywu.exe2⤵PID:740
-
-
C:\Windows\System32\cWAmpPe.exeC:\Windows\System32\cWAmpPe.exe2⤵PID:2612
-
-
C:\Windows\System32\UEDgXuN.exeC:\Windows\System32\UEDgXuN.exe2⤵PID:1560
-
-
C:\Windows\System32\dWVXyar.exeC:\Windows\System32\dWVXyar.exe2⤵PID:1228
-
-
C:\Windows\System32\XLMeHNB.exeC:\Windows\System32\XLMeHNB.exe2⤵PID:1904
-
-
C:\Windows\System32\eAEpkjc.exeC:\Windows\System32\eAEpkjc.exe2⤵PID:3764
-
-
C:\Windows\System32\cUsHFLq.exeC:\Windows\System32\cUsHFLq.exe2⤵PID:4352
-
-
C:\Windows\System32\rgrJMrN.exeC:\Windows\System32\rgrJMrN.exe2⤵PID:2952
-
-
C:\Windows\System32\jSPblXU.exeC:\Windows\System32\jSPblXU.exe2⤵PID:3600
-
-
C:\Windows\System32\SGbjbxo.exeC:\Windows\System32\SGbjbxo.exe2⤵PID:4040
-
-
C:\Windows\System32\oydVuFp.exeC:\Windows\System32\oydVuFp.exe2⤵PID:2596
-
-
C:\Windows\System32\swMVNOy.exeC:\Windows\System32\swMVNOy.exe2⤵PID:4280
-
-
C:\Windows\System32\pvojdye.exeC:\Windows\System32\pvojdye.exe2⤵PID:2000
-
-
C:\Windows\System32\qOpfixD.exeC:\Windows\System32\qOpfixD.exe2⤵PID:1612
-
-
C:\Windows\System32\syAojYX.exeC:\Windows\System32\syAojYX.exe2⤵PID:4676
-
-
C:\Windows\System32\DffnVpH.exeC:\Windows\System32\DffnVpH.exe2⤵PID:1132
-
-
C:\Windows\System32\yJQUSxj.exeC:\Windows\System32\yJQUSxj.exe2⤵PID:5136
-
-
C:\Windows\System32\XGaTSYf.exeC:\Windows\System32\XGaTSYf.exe2⤵PID:5164
-
-
C:\Windows\System32\dgHczjU.exeC:\Windows\System32\dgHczjU.exe2⤵PID:5192
-
-
C:\Windows\System32\DAiXpRW.exeC:\Windows\System32\DAiXpRW.exe2⤵PID:5220
-
-
C:\Windows\System32\nZWLuFH.exeC:\Windows\System32\nZWLuFH.exe2⤵PID:5248
-
-
C:\Windows\System32\IrBOGNP.exeC:\Windows\System32\IrBOGNP.exe2⤵PID:5276
-
-
C:\Windows\System32\oWbPmas.exeC:\Windows\System32\oWbPmas.exe2⤵PID:5304
-
-
C:\Windows\System32\BrbVMID.exeC:\Windows\System32\BrbVMID.exe2⤵PID:5332
-
-
C:\Windows\System32\IykqPAa.exeC:\Windows\System32\IykqPAa.exe2⤵PID:5360
-
-
C:\Windows\System32\jCXbewx.exeC:\Windows\System32\jCXbewx.exe2⤵PID:5388
-
-
C:\Windows\System32\AthyOih.exeC:\Windows\System32\AthyOih.exe2⤵PID:5416
-
-
C:\Windows\System32\jGdWTFd.exeC:\Windows\System32\jGdWTFd.exe2⤵PID:5440
-
-
C:\Windows\System32\LppZZnZ.exeC:\Windows\System32\LppZZnZ.exe2⤵PID:5472
-
-
C:\Windows\System32\WmfqFqG.exeC:\Windows\System32\WmfqFqG.exe2⤵PID:5500
-
-
C:\Windows\System32\QOqXHft.exeC:\Windows\System32\QOqXHft.exe2⤵PID:5528
-
-
C:\Windows\System32\djvKwEv.exeC:\Windows\System32\djvKwEv.exe2⤵PID:5552
-
-
C:\Windows\System32\ghXDOhX.exeC:\Windows\System32\ghXDOhX.exe2⤵PID:5584
-
-
C:\Windows\System32\RuNcBQf.exeC:\Windows\System32\RuNcBQf.exe2⤵PID:5612
-
-
C:\Windows\System32\fEGhegx.exeC:\Windows\System32\fEGhegx.exe2⤵PID:5648
-
-
C:\Windows\System32\ZoHKKJQ.exeC:\Windows\System32\ZoHKKJQ.exe2⤵PID:5680
-
-
C:\Windows\System32\ULcHIyk.exeC:\Windows\System32\ULcHIyk.exe2⤵PID:5696
-
-
C:\Windows\System32\BEtJfeI.exeC:\Windows\System32\BEtJfeI.exe2⤵PID:5724
-
-
C:\Windows\System32\CcVKlXK.exeC:\Windows\System32\CcVKlXK.exe2⤵PID:5760
-
-
C:\Windows\System32\tgOWtwk.exeC:\Windows\System32\tgOWtwk.exe2⤵PID:5780
-
-
C:\Windows\System32\azawNQb.exeC:\Windows\System32\azawNQb.exe2⤵PID:5808
-
-
C:\Windows\System32\IBHNYPZ.exeC:\Windows\System32\IBHNYPZ.exe2⤵PID:5832
-
-
C:\Windows\System32\lXvRfLh.exeC:\Windows\System32\lXvRfLh.exe2⤵PID:5864
-
-
C:\Windows\System32\IodFviR.exeC:\Windows\System32\IodFviR.exe2⤵PID:5892
-
-
C:\Windows\System32\kRLFJSf.exeC:\Windows\System32\kRLFJSf.exe2⤵PID:5980
-
-
C:\Windows\System32\MNqCzTf.exeC:\Windows\System32\MNqCzTf.exe2⤵PID:6000
-
-
C:\Windows\System32\jpPpOTU.exeC:\Windows\System32\jpPpOTU.exe2⤵PID:6020
-
-
C:\Windows\System32\yJipptJ.exeC:\Windows\System32\yJipptJ.exe2⤵PID:6040
-
-
C:\Windows\System32\RXywBGt.exeC:\Windows\System32\RXywBGt.exe2⤵PID:6080
-
-
C:\Windows\System32\DKZaiMk.exeC:\Windows\System32\DKZaiMk.exe2⤵PID:6100
-
-
C:\Windows\System32\RefuhAr.exeC:\Windows\System32\RefuhAr.exe2⤵PID:6124
-
-
C:\Windows\System32\nBoUvGH.exeC:\Windows\System32\nBoUvGH.exe2⤵PID:6140
-
-
C:\Windows\System32\qGOnGTy.exeC:\Windows\System32\qGOnGTy.exe2⤵PID:4308
-
-
C:\Windows\System32\MvvlMks.exeC:\Windows\System32\MvvlMks.exe2⤵PID:756
-
-
C:\Windows\System32\nTYajbX.exeC:\Windows\System32\nTYajbX.exe2⤵PID:5148
-
-
C:\Windows\System32\spwukzV.exeC:\Windows\System32\spwukzV.exe2⤵PID:5172
-
-
C:\Windows\System32\DALnYgJ.exeC:\Windows\System32\DALnYgJ.exe2⤵PID:5232
-
-
C:\Windows\System32\WdXPZio.exeC:\Windows\System32\WdXPZio.exe2⤵PID:5284
-
-
C:\Windows\System32\UFpeYfF.exeC:\Windows\System32\UFpeYfF.exe2⤵PID:5340
-
-
C:\Windows\System32\RsXMoUZ.exeC:\Windows\System32\RsXMoUZ.exe2⤵PID:5380
-
-
C:\Windows\System32\eOxYZfC.exeC:\Windows\System32\eOxYZfC.exe2⤵PID:5408
-
-
C:\Windows\System32\qjyfiqA.exeC:\Windows\System32\qjyfiqA.exe2⤵PID:5436
-
-
C:\Windows\System32\mqcKWPi.exeC:\Windows\System32\mqcKWPi.exe2⤵PID:5464
-
-
C:\Windows\System32\Qgtlhgj.exeC:\Windows\System32\Qgtlhgj.exe2⤵PID:5480
-
-
C:\Windows\System32\ZztrorL.exeC:\Windows\System32\ZztrorL.exe2⤵PID:5548
-
-
C:\Windows\System32\haSYWNt.exeC:\Windows\System32\haSYWNt.exe2⤵PID:2260
-
-
C:\Windows\System32\cIRzGbi.exeC:\Windows\System32\cIRzGbi.exe2⤵PID:5692
-
-
C:\Windows\System32\haZckjL.exeC:\Windows\System32\haZckjL.exe2⤵PID:2012
-
-
C:\Windows\System32\xTtCMSI.exeC:\Windows\System32\xTtCMSI.exe2⤵PID:1400
-
-
C:\Windows\System32\cAWYxWX.exeC:\Windows\System32\cAWYxWX.exe2⤵PID:5768
-
-
C:\Windows\System32\LkNPmrQ.exeC:\Windows\System32\LkNPmrQ.exe2⤵PID:5820
-
-
C:\Windows\System32\DHlNelH.exeC:\Windows\System32\DHlNelH.exe2⤵PID:5900
-
-
C:\Windows\System32\hurZNVj.exeC:\Windows\System32\hurZNVj.exe2⤵PID:2672
-
-
C:\Windows\System32\SOjkfyY.exeC:\Windows\System32\SOjkfyY.exe2⤵PID:6028
-
-
C:\Windows\System32\PsqHJBM.exeC:\Windows\System32\PsqHJBM.exe2⤵PID:1352
-
-
C:\Windows\System32\GvAnjWZ.exeC:\Windows\System32\GvAnjWZ.exe2⤵PID:1880
-
-
C:\Windows\System32\XfZnXfR.exeC:\Windows\System32\XfZnXfR.exe2⤵PID:1148
-
-
C:\Windows\System32\HVQWobn.exeC:\Windows\System32\HVQWobn.exe2⤵PID:5492
-
-
C:\Windows\System32\YSsQVkj.exeC:\Windows\System32\YSsQVkj.exe2⤵PID:3984
-
-
C:\Windows\System32\pLicewK.exeC:\Windows\System32\pLicewK.exe2⤵PID:5540
-
-
C:\Windows\System32\xzrtcdE.exeC:\Windows\System32\xzrtcdE.exe2⤵PID:5776
-
-
C:\Windows\System32\gwVGGDg.exeC:\Windows\System32\gwVGGDg.exe2⤵PID:5792
-
-
C:\Windows\System32\enwSOst.exeC:\Windows\System32\enwSOst.exe2⤵PID:5872
-
-
C:\Windows\System32\GrZXJyU.exeC:\Windows\System32\GrZXJyU.exe2⤵PID:6032
-
-
C:\Windows\System32\UNuLkLY.exeC:\Windows\System32\UNuLkLY.exe2⤵PID:5240
-
-
C:\Windows\System32\vUQSSpa.exeC:\Windows\System32\vUQSSpa.exe2⤵PID:2744
-
-
C:\Windows\System32\uUikzRG.exeC:\Windows\System32\uUikzRG.exe2⤵PID:2776
-
-
C:\Windows\System32\hPcyRkc.exeC:\Windows\System32\hPcyRkc.exe2⤵PID:4760
-
-
C:\Windows\System32\tgaZwYy.exeC:\Windows\System32\tgaZwYy.exe2⤵PID:5256
-
-
C:\Windows\System32\HkUqlsA.exeC:\Windows\System32\HkUqlsA.exe2⤵PID:6168
-
-
C:\Windows\System32\DCMuBKj.exeC:\Windows\System32\DCMuBKj.exe2⤵PID:6196
-
-
C:\Windows\System32\XePFdcx.exeC:\Windows\System32\XePFdcx.exe2⤵PID:6224
-
-
C:\Windows\System32\ReuJxGS.exeC:\Windows\System32\ReuJxGS.exe2⤵PID:6252
-
-
C:\Windows\System32\NzZffeX.exeC:\Windows\System32\NzZffeX.exe2⤵PID:6280
-
-
C:\Windows\System32\xaHgQEZ.exeC:\Windows\System32\xaHgQEZ.exe2⤵PID:6308
-
-
C:\Windows\System32\xQhyewT.exeC:\Windows\System32\xQhyewT.exe2⤵PID:6336
-
-
C:\Windows\System32\OpKimcO.exeC:\Windows\System32\OpKimcO.exe2⤵PID:6368
-
-
C:\Windows\System32\ALVVJzt.exeC:\Windows\System32\ALVVJzt.exe2⤵PID:6424
-
-
C:\Windows\System32\AkWYjrp.exeC:\Windows\System32\AkWYjrp.exe2⤵PID:6448
-
-
C:\Windows\System32\CAQqWzJ.exeC:\Windows\System32\CAQqWzJ.exe2⤵PID:6468
-
-
C:\Windows\System32\NCwwwaQ.exeC:\Windows\System32\NCwwwaQ.exe2⤵PID:6496
-
-
C:\Windows\System32\jwwvhWA.exeC:\Windows\System32\jwwvhWA.exe2⤵PID:6536
-
-
C:\Windows\System32\guoeUzM.exeC:\Windows\System32\guoeUzM.exe2⤵PID:6552
-
-
C:\Windows\System32\nVxWyIx.exeC:\Windows\System32\nVxWyIx.exe2⤵PID:6580
-
-
C:\Windows\System32\adZaMQG.exeC:\Windows\System32\adZaMQG.exe2⤵PID:6608
-
-
C:\Windows\System32\rAKLEsp.exeC:\Windows\System32\rAKLEsp.exe2⤵PID:6636
-
-
C:\Windows\System32\HAEwrfN.exeC:\Windows\System32\HAEwrfN.exe2⤵PID:6664
-
-
C:\Windows\System32\YYrLgun.exeC:\Windows\System32\YYrLgun.exe2⤵PID:6688
-
-
C:\Windows\System32\wVNgNNY.exeC:\Windows\System32\wVNgNNY.exe2⤵PID:6720
-
-
C:\Windows\System32\vWTOAHC.exeC:\Windows\System32\vWTOAHC.exe2⤵PID:6748
-
-
C:\Windows\System32\bADIBIG.exeC:\Windows\System32\bADIBIG.exe2⤵PID:6776
-
-
C:\Windows\System32\DwZDqsg.exeC:\Windows\System32\DwZDqsg.exe2⤵PID:6804
-
-
C:\Windows\System32\gRGDwrn.exeC:\Windows\System32\gRGDwrn.exe2⤵PID:6832
-
-
C:\Windows\System32\WtJYUWQ.exeC:\Windows\System32\WtJYUWQ.exe2⤵PID:6860
-
-
C:\Windows\System32\YeZPKPn.exeC:\Windows\System32\YeZPKPn.exe2⤵PID:6888
-
-
C:\Windows\System32\XHcmEcO.exeC:\Windows\System32\XHcmEcO.exe2⤵PID:6916
-
-
C:\Windows\System32\iKekkMP.exeC:\Windows\System32\iKekkMP.exe2⤵PID:6944
-
-
C:\Windows\System32\bYjDpNt.exeC:\Windows\System32\bYjDpNt.exe2⤵PID:6984
-
-
C:\Windows\System32\uCBDzdF.exeC:\Windows\System32\uCBDzdF.exe2⤵PID:7000
-
-
C:\Windows\System32\lKXGPZk.exeC:\Windows\System32\lKXGPZk.exe2⤵PID:7028
-
-
C:\Windows\System32\drVCoDY.exeC:\Windows\System32\drVCoDY.exe2⤵PID:7052
-
-
C:\Windows\System32\VObPlOI.exeC:\Windows\System32\VObPlOI.exe2⤵PID:7080
-
-
C:\Windows\System32\ONbKHqo.exeC:\Windows\System32\ONbKHqo.exe2⤵PID:7112
-
-
C:\Windows\System32\nGQLqZw.exeC:\Windows\System32\nGQLqZw.exe2⤵PID:4748
-
-
C:\Windows\System32\lNIkvQd.exeC:\Windows\System32\lNIkvQd.exe2⤵PID:5976
-
-
C:\Windows\System32\TiPYXRk.exeC:\Windows\System32\TiPYXRk.exe2⤵PID:6136
-
-
C:\Windows\System32\bOtxByr.exeC:\Windows\System32\bOtxByr.exe2⤵PID:6204
-
-
C:\Windows\System32\HXizPQP.exeC:\Windows\System32\HXizPQP.exe2⤵PID:5972
-
-
C:\Windows\System32\zMQglPo.exeC:\Windows\System32\zMQglPo.exe2⤵PID:6348
-
-
C:\Windows\System32\ZMMVkSd.exeC:\Windows\System32\ZMMVkSd.exe2⤵PID:6376
-
-
C:\Windows\System32\WtjAxwE.exeC:\Windows\System32\WtjAxwE.exe2⤵PID:6480
-
-
C:\Windows\System32\CCKWxiC.exeC:\Windows\System32\CCKWxiC.exe2⤵PID:6504
-
-
C:\Windows\System32\WQpVNyg.exeC:\Windows\System32\WQpVNyg.exe2⤵PID:6564
-
-
C:\Windows\System32\uEVwcOV.exeC:\Windows\System32\uEVwcOV.exe2⤵PID:6620
-
-
C:\Windows\System32\DDLMsOd.exeC:\Windows\System32\DDLMsOd.exe2⤵PID:6768
-
-
C:\Windows\System32\KsaspKm.exeC:\Windows\System32\KsaspKm.exe2⤵PID:6852
-
-
C:\Windows\System32\jJxzrtV.exeC:\Windows\System32\jJxzrtV.exe2⤵PID:6900
-
-
C:\Windows\System32\DPmorzp.exeC:\Windows\System32\DPmorzp.exe2⤵PID:6956
-
-
C:\Windows\System32\UEjLMBp.exeC:\Windows\System32\UEjLMBp.exe2⤵PID:7020
-
-
C:\Windows\System32\tZZOHEr.exeC:\Windows\System32\tZZOHEr.exe2⤵PID:7036
-
-
C:\Windows\System32\TgFpdvM.exeC:\Windows\System32\TgFpdvM.exe2⤵PID:7076
-
-
C:\Windows\System32\wHMKnKu.exeC:\Windows\System32\wHMKnKu.exe2⤵PID:7152
-
-
C:\Windows\System32\gQUyOOh.exeC:\Windows\System32\gQUyOOh.exe2⤵PID:5424
-
-
C:\Windows\System32\xhMjjiJ.exeC:\Windows\System32\xhMjjiJ.exe2⤵PID:5288
-
-
C:\Windows\System32\cgvXFfw.exeC:\Windows\System32\cgvXFfw.exe2⤵PID:6088
-
-
C:\Windows\System32\QkWnpmz.exeC:\Windows\System32\QkWnpmz.exe2⤵PID:6300
-
-
C:\Windows\System32\efzmVhU.exeC:\Windows\System32\efzmVhU.exe2⤵PID:6508
-
-
C:\Windows\System32\OhRPQsE.exeC:\Windows\System32\OhRPQsE.exe2⤵PID:6656
-
-
C:\Windows\System32\HDZdmgZ.exeC:\Windows\System32\HDZdmgZ.exe2⤵PID:6788
-
-
C:\Windows\System32\uSpexrI.exeC:\Windows\System32\uSpexrI.exe2⤵PID:6928
-
-
C:\Windows\System32\ExauOeU.exeC:\Windows\System32\ExauOeU.exe2⤵PID:7012
-
-
C:\Windows\System32\oepyybJ.exeC:\Windows\System32\oepyybJ.exe2⤵PID:6016
-
-
C:\Windows\System32\BGuMSaZ.exeC:\Windows\System32\BGuMSaZ.exe2⤵PID:6188
-
-
C:\Windows\System32\FIMLAUk.exeC:\Windows\System32\FIMLAUk.exe2⤵PID:6600
-
-
C:\Windows\System32\sUBgjpz.exeC:\Windows\System32\sUBgjpz.exe2⤵PID:6976
-
-
C:\Windows\System32\saKZGYL.exeC:\Windows\System32\saKZGYL.exe2⤵PID:6784
-
-
C:\Windows\System32\ZFWgdIX.exeC:\Windows\System32\ZFWgdIX.exe2⤵PID:6560
-
-
C:\Windows\System32\sfAwTzf.exeC:\Windows\System32\sfAwTzf.exe2⤵PID:7180
-
-
C:\Windows\System32\CCMWwoX.exeC:\Windows\System32\CCMWwoX.exe2⤵PID:7200
-
-
C:\Windows\System32\fyyxcgM.exeC:\Windows\System32\fyyxcgM.exe2⤵PID:7236
-
-
C:\Windows\System32\kWGdodI.exeC:\Windows\System32\kWGdodI.exe2⤵PID:7260
-
-
C:\Windows\System32\hytdgGT.exeC:\Windows\System32\hytdgGT.exe2⤵PID:7284
-
-
C:\Windows\System32\uKmlIed.exeC:\Windows\System32\uKmlIed.exe2⤵PID:7308
-
-
C:\Windows\System32\SvpasOR.exeC:\Windows\System32\SvpasOR.exe2⤵PID:7332
-
-
C:\Windows\System32\MOIchqg.exeC:\Windows\System32\MOIchqg.exe2⤵PID:7356
-
-
C:\Windows\System32\xMrFifs.exeC:\Windows\System32\xMrFifs.exe2⤵PID:7372
-
-
C:\Windows\System32\NYRTCko.exeC:\Windows\System32\NYRTCko.exe2⤵PID:7404
-
-
C:\Windows\System32\HiDMbzm.exeC:\Windows\System32\HiDMbzm.exe2⤵PID:7424
-
-
C:\Windows\System32\mjRkiKs.exeC:\Windows\System32\mjRkiKs.exe2⤵PID:7492
-
-
C:\Windows\System32\jEhNEIj.exeC:\Windows\System32\jEhNEIj.exe2⤵PID:7516
-
-
C:\Windows\System32\vvwtmju.exeC:\Windows\System32\vvwtmju.exe2⤵PID:7540
-
-
C:\Windows\System32\oYLajmZ.exeC:\Windows\System32\oYLajmZ.exe2⤵PID:7560
-
-
C:\Windows\System32\Jgflhje.exeC:\Windows\System32\Jgflhje.exe2⤵PID:7600
-
-
C:\Windows\System32\uKPKipR.exeC:\Windows\System32\uKPKipR.exe2⤵PID:7644
-
-
C:\Windows\System32\rabcajy.exeC:\Windows\System32\rabcajy.exe2⤵PID:7664
-
-
C:\Windows\System32\OQiwnXU.exeC:\Windows\System32\OQiwnXU.exe2⤵PID:7680
-
-
C:\Windows\System32\fCHzudx.exeC:\Windows\System32\fCHzudx.exe2⤵PID:7716
-
-
C:\Windows\System32\itgFpSp.exeC:\Windows\System32\itgFpSp.exe2⤵PID:7752
-
-
C:\Windows\System32\UrGrvVA.exeC:\Windows\System32\UrGrvVA.exe2⤵PID:7776
-
-
C:\Windows\System32\vBVJUHo.exeC:\Windows\System32\vBVJUHo.exe2⤵PID:7800
-
-
C:\Windows\System32\MmIDCJV.exeC:\Windows\System32\MmIDCJV.exe2⤵PID:7832
-
-
C:\Windows\System32\mFkWhDo.exeC:\Windows\System32\mFkWhDo.exe2⤵PID:7856
-
-
C:\Windows\System32\iZoJNJb.exeC:\Windows\System32\iZoJNJb.exe2⤵PID:7876
-
-
C:\Windows\System32\RZaBGyE.exeC:\Windows\System32\RZaBGyE.exe2⤵PID:7920
-
-
C:\Windows\System32\wvXhWgP.exeC:\Windows\System32\wvXhWgP.exe2⤵PID:7936
-
-
C:\Windows\System32\OVTqcih.exeC:\Windows\System32\OVTqcih.exe2⤵PID:7968
-
-
C:\Windows\System32\iekuRho.exeC:\Windows\System32\iekuRho.exe2⤵PID:7984
-
-
C:\Windows\System32\aUizNoW.exeC:\Windows\System32\aUizNoW.exe2⤵PID:8028
-
-
C:\Windows\System32\CEdWtEN.exeC:\Windows\System32\CEdWtEN.exe2⤵PID:8052
-
-
C:\Windows\System32\EUwmipL.exeC:\Windows\System32\EUwmipL.exe2⤵PID:8076
-
-
C:\Windows\System32\EWDheiL.exeC:\Windows\System32\EWDheiL.exe2⤵PID:8092
-
-
C:\Windows\System32\hoXXNXJ.exeC:\Windows\System32\hoXXNXJ.exe2⤵PID:8128
-
-
C:\Windows\System32\JkAOkIv.exeC:\Windows\System32\JkAOkIv.exe2⤵PID:8148
-
-
C:\Windows\System32\bsoURfb.exeC:\Windows\System32\bsoURfb.exe2⤵PID:7196
-
-
C:\Windows\System32\WTbRVBj.exeC:\Windows\System32\WTbRVBj.exe2⤵PID:7272
-
-
C:\Windows\System32\HdoBEXL.exeC:\Windows\System32\HdoBEXL.exe2⤵PID:7292
-
-
C:\Windows\System32\wMcaiKR.exeC:\Windows\System32\wMcaiKR.exe2⤵PID:7388
-
-
C:\Windows\System32\YsixZUy.exeC:\Windows\System32\YsixZUy.exe2⤵PID:7472
-
-
C:\Windows\System32\rTqVBSh.exeC:\Windows\System32\rTqVBSh.exe2⤵PID:7524
-
-
C:\Windows\System32\PbaukLS.exeC:\Windows\System32\PbaukLS.exe2⤵PID:7636
-
-
C:\Windows\System32\itvCQWu.exeC:\Windows\System32\itvCQWu.exe2⤵PID:7656
-
-
C:\Windows\System32\COsesnz.exeC:\Windows\System32\COsesnz.exe2⤵PID:7696
-
-
C:\Windows\System32\PufekxG.exeC:\Windows\System32\PufekxG.exe2⤵PID:7740
-
-
C:\Windows\System32\vvTtVMY.exeC:\Windows\System32\vvTtVMY.exe2⤵PID:7824
-
-
C:\Windows\System32\ezsmnvB.exeC:\Windows\System32\ezsmnvB.exe2⤵PID:7884
-
-
C:\Windows\System32\VNCflCE.exeC:\Windows\System32\VNCflCE.exe2⤵PID:7928
-
-
C:\Windows\System32\gDJIQOX.exeC:\Windows\System32\gDJIQOX.exe2⤵PID:8012
-
-
C:\Windows\System32\vdlGwNO.exeC:\Windows\System32\vdlGwNO.exe2⤵PID:8036
-
-
C:\Windows\System32\rdNlrib.exeC:\Windows\System32\rdNlrib.exe2⤵PID:8108
-
-
C:\Windows\System32\JxzPBRy.exeC:\Windows\System32\JxzPBRy.exe2⤵PID:8160
-
-
C:\Windows\System32\fdxVgFf.exeC:\Windows\System32\fdxVgFf.exe2⤵PID:7328
-
-
C:\Windows\System32\qPfcksw.exeC:\Windows\System32\qPfcksw.exe2⤵PID:7432
-
-
C:\Windows\System32\UjvaQMH.exeC:\Windows\System32\UjvaQMH.exe2⤵PID:7552
-
-
C:\Windows\System32\oGSfOaZ.exeC:\Windows\System32\oGSfOaZ.exe2⤵PID:7652
-
-
C:\Windows\System32\duElbMJ.exeC:\Windows\System32\duElbMJ.exe2⤵PID:7796
-
-
C:\Windows\System32\QelEbqU.exeC:\Windows\System32\QelEbqU.exe2⤵PID:7944
-
-
C:\Windows\System32\lTDITWH.exeC:\Windows\System32\lTDITWH.exe2⤵PID:8100
-
-
C:\Windows\System32\JdHvYPq.exeC:\Windows\System32\JdHvYPq.exe2⤵PID:7852
-
-
C:\Windows\System32\kEKIanY.exeC:\Windows\System32\kEKIanY.exe2⤵PID:7844
-
-
C:\Windows\System32\EmvVMWJ.exeC:\Windows\System32\EmvVMWJ.exe2⤵PID:8156
-
-
C:\Windows\System32\jKZRBmm.exeC:\Windows\System32\jKZRBmm.exe2⤵PID:7324
-
-
C:\Windows\System32\ffLOKeh.exeC:\Windows\System32\ffLOKeh.exe2⤵PID:8236
-
-
C:\Windows\System32\npHIGlB.exeC:\Windows\System32\npHIGlB.exe2⤵PID:8264
-
-
C:\Windows\System32\MyOPOTa.exeC:\Windows\System32\MyOPOTa.exe2⤵PID:8288
-
-
C:\Windows\System32\uWSSckV.exeC:\Windows\System32\uWSSckV.exe2⤵PID:8308
-
-
C:\Windows\System32\YmHwEYH.exeC:\Windows\System32\YmHwEYH.exe2⤵PID:8332
-
-
C:\Windows\System32\kVAZuwL.exeC:\Windows\System32\kVAZuwL.exe2⤵PID:8352
-
-
C:\Windows\System32\fiUbMwg.exeC:\Windows\System32\fiUbMwg.exe2⤵PID:8380
-
-
C:\Windows\System32\WMqjSCC.exeC:\Windows\System32\WMqjSCC.exe2⤵PID:8396
-
-
C:\Windows\System32\XQMoAaz.exeC:\Windows\System32\XQMoAaz.exe2⤵PID:8428
-
-
C:\Windows\System32\XAapyPU.exeC:\Windows\System32\XAapyPU.exe2⤵PID:8452
-
-
C:\Windows\System32\RelNEKh.exeC:\Windows\System32\RelNEKh.exe2⤵PID:8476
-
-
C:\Windows\System32\XYvvpuk.exeC:\Windows\System32\XYvvpuk.exe2⤵PID:8500
-
-
C:\Windows\System32\iODctMZ.exeC:\Windows\System32\iODctMZ.exe2⤵PID:8540
-
-
C:\Windows\System32\pscFyGw.exeC:\Windows\System32\pscFyGw.exe2⤵PID:8604
-
-
C:\Windows\System32\pAfWIJZ.exeC:\Windows\System32\pAfWIJZ.exe2⤵PID:8632
-
-
C:\Windows\System32\dkwxCxt.exeC:\Windows\System32\dkwxCxt.exe2⤵PID:8652
-
-
C:\Windows\System32\hWnzjEL.exeC:\Windows\System32\hWnzjEL.exe2⤵PID:8680
-
-
C:\Windows\System32\rReZSfp.exeC:\Windows\System32\rReZSfp.exe2⤵PID:8712
-
-
C:\Windows\System32\HuXsQhW.exeC:\Windows\System32\HuXsQhW.exe2⤵PID:8744
-
-
C:\Windows\System32\iztfxRa.exeC:\Windows\System32\iztfxRa.exe2⤵PID:8788
-
-
C:\Windows\System32\ZHKALbn.exeC:\Windows\System32\ZHKALbn.exe2⤵PID:8812
-
-
C:\Windows\System32\LGyFdbu.exeC:\Windows\System32\LGyFdbu.exe2⤵PID:8832
-
-
C:\Windows\System32\nzDUlQZ.exeC:\Windows\System32\nzDUlQZ.exe2⤵PID:8852
-
-
C:\Windows\System32\cdhxMKc.exeC:\Windows\System32\cdhxMKc.exe2⤵PID:8880
-
-
C:\Windows\System32\RlCVTbv.exeC:\Windows\System32\RlCVTbv.exe2⤵PID:8904
-
-
C:\Windows\System32\GMUAJST.exeC:\Windows\System32\GMUAJST.exe2⤵PID:8924
-
-
C:\Windows\System32\qiTvULh.exeC:\Windows\System32\qiTvULh.exe2⤵PID:8944
-
-
C:\Windows\System32\WyGBCCc.exeC:\Windows\System32\WyGBCCc.exe2⤵PID:8988
-
-
C:\Windows\System32\JFtPjFj.exeC:\Windows\System32\JFtPjFj.exe2⤵PID:9016
-
-
C:\Windows\System32\ddUrYXe.exeC:\Windows\System32\ddUrYXe.exe2⤵PID:9036
-
-
C:\Windows\System32\YJRErVg.exeC:\Windows\System32\YJRErVg.exe2⤵PID:9084
-
-
C:\Windows\System32\pmmroXn.exeC:\Windows\System32\pmmroXn.exe2⤵PID:9124
-
-
C:\Windows\System32\lJSszeG.exeC:\Windows\System32\lJSszeG.exe2⤵PID:9140
-
-
C:\Windows\System32\pBzOFUy.exeC:\Windows\System32\pBzOFUy.exe2⤵PID:9168
-
-
C:\Windows\System32\pDWWbSn.exeC:\Windows\System32\pDWWbSn.exe2⤵PID:9184
-
-
C:\Windows\System32\TnNgxYe.exeC:\Windows\System32\TnNgxYe.exe2⤵PID:7812
-
-
C:\Windows\System32\XZMyPDR.exeC:\Windows\System32\XZMyPDR.exe2⤵PID:8252
-
-
C:\Windows\System32\EMnUEBs.exeC:\Windows\System32\EMnUEBs.exe2⤵PID:8324
-
-
C:\Windows\System32\UQAdxBs.exeC:\Windows\System32\UQAdxBs.exe2⤵PID:8328
-
-
C:\Windows\System32\tcWmXNf.exeC:\Windows\System32\tcWmXNf.exe2⤵PID:8468
-
-
C:\Windows\System32\afvLBwT.exeC:\Windows\System32\afvLBwT.exe2⤵PID:8444
-
-
C:\Windows\System32\jxWrsgo.exeC:\Windows\System32\jxWrsgo.exe2⤵PID:8528
-
-
C:\Windows\System32\WDNSHkM.exeC:\Windows\System32\WDNSHkM.exe2⤵PID:8612
-
-
C:\Windows\System32\QYbNeMG.exeC:\Windows\System32\QYbNeMG.exe2⤵PID:8704
-
-
C:\Windows\System32\YbWjQPi.exeC:\Windows\System32\YbWjQPi.exe2⤵PID:8820
-
-
C:\Windows\System32\QNyQoAJ.exeC:\Windows\System32\QNyQoAJ.exe2⤵PID:8848
-
-
C:\Windows\System32\qMKFlxs.exeC:\Windows\System32\qMKFlxs.exe2⤵PID:8916
-
-
C:\Windows\System32\KMeNBvG.exeC:\Windows\System32\KMeNBvG.exe2⤵PID:9024
-
-
C:\Windows\System32\uLBMxQd.exeC:\Windows\System32\uLBMxQd.exe2⤵PID:9076
-
-
C:\Windows\System32\gtYrkfI.exeC:\Windows\System32\gtYrkfI.exe2⤵PID:9156
-
-
C:\Windows\System32\LitOxDk.exeC:\Windows\System32\LitOxDk.exe2⤵PID:9196
-
-
C:\Windows\System32\HGUvcmm.exeC:\Windows\System32\HGUvcmm.exe2⤵PID:8280
-
-
C:\Windows\System32\FzqGkfH.exeC:\Windows\System32\FzqGkfH.exe2⤵PID:8412
-
-
C:\Windows\System32\XdXfMdo.exeC:\Windows\System32\XdXfMdo.exe2⤵PID:8404
-
-
C:\Windows\System32\qdaCjmj.exeC:\Windows\System32\qdaCjmj.exe2⤵PID:8648
-
-
C:\Windows\System32\HQQZehX.exeC:\Windows\System32\HQQZehX.exe2⤵PID:8756
-
-
C:\Windows\System32\cydVozi.exeC:\Windows\System32\cydVozi.exe2⤵PID:8868
-
-
C:\Windows\System32\jbqYjhR.exeC:\Windows\System32\jbqYjhR.exe2⤵PID:9004
-
-
C:\Windows\System32\TLUVDtf.exeC:\Windows\System32\TLUVDtf.exe2⤵PID:3816
-
-
C:\Windows\System32\GUBxTvU.exeC:\Windows\System32\GUBxTvU.exe2⤵PID:8760
-
-
C:\Windows\System32\flJmnuQ.exeC:\Windows\System32\flJmnuQ.exe2⤵PID:8828
-
-
C:\Windows\System32\xuGnBZW.exeC:\Windows\System32\xuGnBZW.exe2⤵PID:8696
-
-
C:\Windows\System32\ZZkiNhm.exeC:\Windows\System32\ZZkiNhm.exe2⤵PID:9228
-
-
C:\Windows\System32\vsXVVcC.exeC:\Windows\System32\vsXVVcC.exe2⤵PID:9272
-
-
C:\Windows\System32\PDtsSuX.exeC:\Windows\System32\PDtsSuX.exe2⤵PID:9292
-
-
C:\Windows\System32\EMrbmrN.exeC:\Windows\System32\EMrbmrN.exe2⤵PID:9308
-
-
C:\Windows\System32\zPhAAKF.exeC:\Windows\System32\zPhAAKF.exe2⤵PID:9344
-
-
C:\Windows\System32\gRUaGAK.exeC:\Windows\System32\gRUaGAK.exe2⤵PID:9368
-
-
C:\Windows\System32\dUYxcPs.exeC:\Windows\System32\dUYxcPs.exe2⤵PID:9392
-
-
C:\Windows\System32\DGpXjCW.exeC:\Windows\System32\DGpXjCW.exe2⤵PID:9436
-
-
C:\Windows\System32\UFIVGPv.exeC:\Windows\System32\UFIVGPv.exe2⤵PID:9460
-
-
C:\Windows\System32\BcoMXhZ.exeC:\Windows\System32\BcoMXhZ.exe2⤵PID:9480
-
-
C:\Windows\System32\BXKsECZ.exeC:\Windows\System32\BXKsECZ.exe2⤵PID:9500
-
-
C:\Windows\System32\BBpzcQP.exeC:\Windows\System32\BBpzcQP.exe2⤵PID:9532
-
-
C:\Windows\System32\RGVMRtd.exeC:\Windows\System32\RGVMRtd.exe2⤵PID:9552
-
-
C:\Windows\System32\nYdrfII.exeC:\Windows\System32\nYdrfII.exe2⤵PID:9572
-
-
C:\Windows\System32\iBorpgV.exeC:\Windows\System32\iBorpgV.exe2⤵PID:9600
-
-
C:\Windows\System32\BWukmFj.exeC:\Windows\System32\BWukmFj.exe2⤵PID:9684
-
-
C:\Windows\System32\yTRmvsN.exeC:\Windows\System32\yTRmvsN.exe2⤵PID:9700
-
-
C:\Windows\System32\GlkEOiR.exeC:\Windows\System32\GlkEOiR.exe2⤵PID:9716
-
-
C:\Windows\System32\hZgdGNv.exeC:\Windows\System32\hZgdGNv.exe2⤵PID:9736
-
-
C:\Windows\System32\XmVubFE.exeC:\Windows\System32\XmVubFE.exe2⤵PID:9840
-
-
C:\Windows\System32\uijyJSE.exeC:\Windows\System32\uijyJSE.exe2⤵PID:9860
-
-
C:\Windows\System32\VLkYXyi.exeC:\Windows\System32\VLkYXyi.exe2⤵PID:9880
-
-
C:\Windows\System32\laLyhzG.exeC:\Windows\System32\laLyhzG.exe2⤵PID:9896
-
-
C:\Windows\System32\PmBWKFV.exeC:\Windows\System32\PmBWKFV.exe2⤵PID:9924
-
-
C:\Windows\System32\LNWcpqF.exeC:\Windows\System32\LNWcpqF.exe2⤵PID:9944
-
-
C:\Windows\System32\qBKSSus.exeC:\Windows\System32\qBKSSus.exe2⤵PID:9964
-
-
C:\Windows\System32\sNWxfVh.exeC:\Windows\System32\sNWxfVh.exe2⤵PID:9996
-
-
C:\Windows\System32\OjVPQFr.exeC:\Windows\System32\OjVPQFr.exe2⤵PID:10120
-
-
C:\Windows\System32\CknPMjv.exeC:\Windows\System32\CknPMjv.exe2⤵PID:10148
-
-
C:\Windows\System32\ZsfqgGt.exeC:\Windows\System32\ZsfqgGt.exe2⤵PID:10168
-
-
C:\Windows\System32\GvfPXIq.exeC:\Windows\System32\GvfPXIq.exe2⤵PID:10196
-
-
C:\Windows\System32\OVngLRQ.exeC:\Windows\System32\OVngLRQ.exe2⤵PID:10220
-
-
C:\Windows\System32\TWdBXbE.exeC:\Windows\System32\TWdBXbE.exe2⤵PID:5116
-
-
C:\Windows\System32\mUaWyDN.exeC:\Windows\System32\mUaWyDN.exe2⤵PID:9280
-
-
C:\Windows\System32\LbSrCWD.exeC:\Windows\System32\LbSrCWD.exe2⤵PID:9320
-
-
C:\Windows\System32\rjnfGzc.exeC:\Windows\System32\rjnfGzc.exe2⤵PID:9376
-
-
C:\Windows\System32\GfpQZpf.exeC:\Windows\System32\GfpQZpf.exe2⤵PID:9424
-
-
C:\Windows\System32\ivEUpoA.exeC:\Windows\System32\ivEUpoA.exe2⤵PID:9476
-
-
C:\Windows\System32\iUjrxfZ.exeC:\Windows\System32\iUjrxfZ.exe2⤵PID:9568
-
-
C:\Windows\System32\MlmRUcZ.exeC:\Windows\System32\MlmRUcZ.exe2⤵PID:9584
-
-
C:\Windows\System32\tegthRc.exeC:\Windows\System32\tegthRc.exe2⤵PID:9768
-
-
C:\Windows\System32\HTUcosL.exeC:\Windows\System32\HTUcosL.exe2⤵PID:9608
-
-
C:\Windows\System32\giNtmBv.exeC:\Windows\System32\giNtmBv.exe2⤵PID:9656
-
-
C:\Windows\System32\HUoxhfj.exeC:\Windows\System32\HUoxhfj.exe2⤵PID:9792
-
-
C:\Windows\System32\UVvpSkS.exeC:\Windows\System32\UVvpSkS.exe2⤵PID:9824
-
-
C:\Windows\System32\LaMFvNe.exeC:\Windows\System32\LaMFvNe.exe2⤵PID:9804
-
-
C:\Windows\System32\QxSPxDH.exeC:\Windows\System32\QxSPxDH.exe2⤵PID:9836
-
-
C:\Windows\System32\XWAQUDN.exeC:\Windows\System32\XWAQUDN.exe2⤵PID:10096
-
-
C:\Windows\System32\FZLpzAr.exeC:\Windows\System32\FZLpzAr.exe2⤵PID:10140
-
-
C:\Windows\System32\xGUDEyx.exeC:\Windows\System32\xGUDEyx.exe2⤵PID:10176
-
-
C:\Windows\System32\MQFSzot.exeC:\Windows\System32\MQFSzot.exe2⤵PID:10232
-
-
C:\Windows\System32\AWUOXug.exeC:\Windows\System32\AWUOXug.exe2⤵PID:9304
-
-
C:\Windows\System32\FwMCbUf.exeC:\Windows\System32\FwMCbUf.exe2⤵PID:9384
-
-
C:\Windows\System32\uazXfNk.exeC:\Windows\System32\uazXfNk.exe2⤵PID:9448
-
-
C:\Windows\System32\CDNnkFl.exeC:\Windows\System32\CDNnkFl.exe2⤵PID:9728
-
-
C:\Windows\System32\gikbDVh.exeC:\Windows\System32\gikbDVh.exe2⤵PID:9820
-
-
C:\Windows\System32\OeVEYxw.exeC:\Windows\System32\OeVEYxw.exe2⤵PID:9976
-
-
C:\Windows\System32\gTUjkRr.exeC:\Windows\System32\gTUjkRr.exe2⤵PID:9936
-
-
C:\Windows\System32\niNfpOR.exeC:\Windows\System32\niNfpOR.exe2⤵PID:10228
-
-
C:\Windows\System32\eXqblWQ.exeC:\Windows\System32\eXqblWQ.exe2⤵PID:9404
-
-
C:\Windows\System32\smSFlfU.exeC:\Windows\System32\smSFlfU.exe2⤵PID:9620
-
-
C:\Windows\System32\rAkOgRA.exeC:\Windows\System32\rAkOgRA.exe2⤵PID:9492
-
-
C:\Windows\System32\fVXjLpg.exeC:\Windows\System32\fVXjLpg.exe2⤵PID:9888
-
-
C:\Windows\System32\tZspLzd.exeC:\Windows\System32\tZspLzd.exe2⤵PID:10256
-
-
C:\Windows\System32\OUvIUXa.exeC:\Windows\System32\OUvIUXa.exe2⤵PID:10276
-
-
C:\Windows\System32\CkFAGRz.exeC:\Windows\System32\CkFAGRz.exe2⤵PID:10300
-
-
C:\Windows\System32\KinzMAs.exeC:\Windows\System32\KinzMAs.exe2⤵PID:10320
-
-
C:\Windows\System32\FqwqkwB.exeC:\Windows\System32\FqwqkwB.exe2⤵PID:10344
-
-
C:\Windows\System32\LCfHKwl.exeC:\Windows\System32\LCfHKwl.exe2⤵PID:10380
-
-
C:\Windows\System32\HsnECVR.exeC:\Windows\System32\HsnECVR.exe2⤵PID:10400
-
-
C:\Windows\System32\EMRNnIW.exeC:\Windows\System32\EMRNnIW.exe2⤵PID:10420
-
-
C:\Windows\System32\sRKkBjC.exeC:\Windows\System32\sRKkBjC.exe2⤵PID:10464
-
-
C:\Windows\System32\VPlsqPB.exeC:\Windows\System32\VPlsqPB.exe2⤵PID:10508
-
-
C:\Windows\System32\zVZcscJ.exeC:\Windows\System32\zVZcscJ.exe2⤵PID:10528
-
-
C:\Windows\System32\nGFQvIX.exeC:\Windows\System32\nGFQvIX.exe2⤵PID:10564
-
-
C:\Windows\System32\LZFKkGR.exeC:\Windows\System32\LZFKkGR.exe2⤵PID:10580
-
-
C:\Windows\System32\rhpaqTu.exeC:\Windows\System32\rhpaqTu.exe2⤵PID:10600
-
-
C:\Windows\System32\ohcPTzL.exeC:\Windows\System32\ohcPTzL.exe2⤵PID:10616
-
-
C:\Windows\System32\NuIXuAO.exeC:\Windows\System32\NuIXuAO.exe2⤵PID:10652
-
-
C:\Windows\System32\HtAeeIf.exeC:\Windows\System32\HtAeeIf.exe2⤵PID:10672
-
-
C:\Windows\System32\rekLACw.exeC:\Windows\System32\rekLACw.exe2⤵PID:10700
-
-
C:\Windows\System32\aMzGCDu.exeC:\Windows\System32\aMzGCDu.exe2⤵PID:10752
-
-
C:\Windows\System32\EgvfXwP.exeC:\Windows\System32\EgvfXwP.exe2⤵PID:10788
-
-
C:\Windows\System32\UYhznll.exeC:\Windows\System32\UYhznll.exe2⤵PID:10828
-
-
C:\Windows\System32\nEOqKAH.exeC:\Windows\System32\nEOqKAH.exe2⤵PID:10856
-
-
C:\Windows\System32\xfJqHNK.exeC:\Windows\System32\xfJqHNK.exe2⤵PID:10880
-
-
C:\Windows\System32\snbGrvW.exeC:\Windows\System32\snbGrvW.exe2⤵PID:10900
-
-
C:\Windows\System32\KQTiUrp.exeC:\Windows\System32\KQTiUrp.exe2⤵PID:10916
-
-
C:\Windows\System32\nKvxbiZ.exeC:\Windows\System32\nKvxbiZ.exe2⤵PID:10956
-
-
C:\Windows\System32\eyeFgaV.exeC:\Windows\System32\eyeFgaV.exe2⤵PID:10976
-
-
C:\Windows\System32\bRaSthm.exeC:\Windows\System32\bRaSthm.exe2⤵PID:11000
-
-
C:\Windows\System32\qRrnNFS.exeC:\Windows\System32\qRrnNFS.exe2⤵PID:11016
-
-
C:\Windows\System32\sUzWrYq.exeC:\Windows\System32\sUzWrYq.exe2⤵PID:11036
-
-
C:\Windows\System32\bjZDxcd.exeC:\Windows\System32\bjZDxcd.exe2⤵PID:11064
-
-
C:\Windows\System32\uzUqPGG.exeC:\Windows\System32\uzUqPGG.exe2⤵PID:11104
-
-
C:\Windows\System32\EHKfmbM.exeC:\Windows\System32\EHKfmbM.exe2⤵PID:11132
-
-
C:\Windows\System32\qPmzQvY.exeC:\Windows\System32\qPmzQvY.exe2⤵PID:11168
-
-
C:\Windows\System32\ppEIMap.exeC:\Windows\System32\ppEIMap.exe2⤵PID:11184
-
-
C:\Windows\System32\MkzGQLU.exeC:\Windows\System32\MkzGQLU.exe2⤵PID:11212
-
-
C:\Windows\System32\ImZhVAt.exeC:\Windows\System32\ImZhVAt.exe2⤵PID:11236
-
-
C:\Windows\System32\ihmsIHb.exeC:\Windows\System32\ihmsIHb.exe2⤵PID:10272
-
-
C:\Windows\System32\sGPrevF.exeC:\Windows\System32\sGPrevF.exe2⤵PID:10340
-
-
C:\Windows\System32\OUNSrPZ.exeC:\Windows\System32\OUNSrPZ.exe2⤵PID:10388
-
-
C:\Windows\System32\SpwSjsY.exeC:\Windows\System32\SpwSjsY.exe2⤵PID:10428
-
-
C:\Windows\System32\mEWxyqM.exeC:\Windows\System32\mEWxyqM.exe2⤵PID:10472
-
-
C:\Windows\System32\cDcxpzH.exeC:\Windows\System32\cDcxpzH.exe2⤵PID:10540
-
-
C:\Windows\System32\iBNXqUt.exeC:\Windows\System32\iBNXqUt.exe2⤵PID:10592
-
-
C:\Windows\System32\zCOQwUQ.exeC:\Windows\System32\zCOQwUQ.exe2⤵PID:10684
-
-
C:\Windows\System32\DcUyJEi.exeC:\Windows\System32\DcUyJEi.exe2⤵PID:10780
-
-
C:\Windows\System32\yICxCTx.exeC:\Windows\System32\yICxCTx.exe2⤵PID:10812
-
-
C:\Windows\System32\SdqxBmY.exeC:\Windows\System32\SdqxBmY.exe2⤵PID:10888
-
-
C:\Windows\System32\hEJLkBu.exeC:\Windows\System32\hEJLkBu.exe2⤵PID:10944
-
-
C:\Windows\System32\kSgGHUm.exeC:\Windows\System32\kSgGHUm.exe2⤵PID:10992
-
-
C:\Windows\System32\qGgwOJF.exeC:\Windows\System32\qGgwOJF.exe2⤵PID:11028
-
-
C:\Windows\System32\xBaUDBd.exeC:\Windows\System32\xBaUDBd.exe2⤵PID:11140
-
-
C:\Windows\System32\NDNeYub.exeC:\Windows\System32\NDNeYub.exe2⤵PID:11176
-
-
C:\Windows\System32\ZRrQENu.exeC:\Windows\System32\ZRrQENu.exe2⤵PID:11224
-
-
C:\Windows\System32\yyYGgxM.exeC:\Windows\System32\yyYGgxM.exe2⤵PID:10284
-
-
C:\Windows\System32\yZjncXQ.exeC:\Windows\System32\yZjncXQ.exe2⤵PID:10544
-
-
C:\Windows\System32\QhoWLQM.exeC:\Windows\System32\QhoWLQM.exe2⤵PID:10840
-
-
C:\Windows\System32\iLWXDah.exeC:\Windows\System32\iLWXDah.exe2⤵PID:10984
-
-
C:\Windows\System32\MzHIagB.exeC:\Windows\System32\MzHIagB.exe2⤵PID:11180
-
-
C:\Windows\System32\OaNeUCI.exeC:\Windows\System32\OaNeUCI.exe2⤵PID:10364
-
-
C:\Windows\System32\QrGEsan.exeC:\Windows\System32\QrGEsan.exe2⤵PID:10708
-
-
C:\Windows\System32\azjradm.exeC:\Windows\System32\azjradm.exe2⤵PID:11008
-
-
C:\Windows\System32\bAYXLuP.exeC:\Windows\System32\bAYXLuP.exe2⤵PID:10524
-
-
C:\Windows\System32\CQnPvrZ.exeC:\Windows\System32\CQnPvrZ.exe2⤵PID:10968
-
-
C:\Windows\System32\PSeaWJp.exeC:\Windows\System32\PSeaWJp.exe2⤵PID:11268
-
-
C:\Windows\System32\PPzGhhx.exeC:\Windows\System32\PPzGhhx.exe2⤵PID:11296
-
-
C:\Windows\System32\mRphKmx.exeC:\Windows\System32\mRphKmx.exe2⤵PID:11312
-
-
C:\Windows\System32\uRKfxYh.exeC:\Windows\System32\uRKfxYh.exe2⤵PID:11368
-
-
C:\Windows\System32\XBKyglY.exeC:\Windows\System32\XBKyglY.exe2⤵PID:11396
-
-
C:\Windows\System32\yPgARCG.exeC:\Windows\System32\yPgARCG.exe2⤵PID:11412
-
-
C:\Windows\System32\BfYqwpk.exeC:\Windows\System32\BfYqwpk.exe2⤵PID:11440
-
-
C:\Windows\System32\ChlzjKS.exeC:\Windows\System32\ChlzjKS.exe2⤵PID:11464
-
-
C:\Windows\System32\zJZHjVr.exeC:\Windows\System32\zJZHjVr.exe2⤵PID:11480
-
-
C:\Windows\System32\zlbXkyZ.exeC:\Windows\System32\zlbXkyZ.exe2⤵PID:11524
-
-
C:\Windows\System32\vcZOaqO.exeC:\Windows\System32\vcZOaqO.exe2⤵PID:11544
-
-
C:\Windows\System32\dIhpPwT.exeC:\Windows\System32\dIhpPwT.exe2⤵PID:11576
-
-
C:\Windows\System32\iBGFmGy.exeC:\Windows\System32\iBGFmGy.exe2⤵PID:11596
-
-
C:\Windows\System32\cBUXvlE.exeC:\Windows\System32\cBUXvlE.exe2⤵PID:11632
-
-
C:\Windows\System32\RNFotgm.exeC:\Windows\System32\RNFotgm.exe2⤵PID:11656
-
-
C:\Windows\System32\WRQbffQ.exeC:\Windows\System32\WRQbffQ.exe2⤵PID:11684
-
-
C:\Windows\System32\sipKaWp.exeC:\Windows\System32\sipKaWp.exe2⤵PID:11708
-
-
C:\Windows\System32\cAAUIZK.exeC:\Windows\System32\cAAUIZK.exe2⤵PID:11728
-
-
C:\Windows\System32\YVNVvUV.exeC:\Windows\System32\YVNVvUV.exe2⤵PID:11744
-
-
C:\Windows\System32\MDCCKkK.exeC:\Windows\System32\MDCCKkK.exe2⤵PID:11784
-
-
C:\Windows\System32\QZeVZGq.exeC:\Windows\System32\QZeVZGq.exe2⤵PID:11800
-
-
C:\Windows\System32\rnwKops.exeC:\Windows\System32\rnwKops.exe2⤵PID:11844
-
-
C:\Windows\System32\UraEBys.exeC:\Windows\System32\UraEBys.exe2⤵PID:11868
-
-
C:\Windows\System32\pWbxlKw.exeC:\Windows\System32\pWbxlKw.exe2⤵PID:11892
-
-
C:\Windows\System32\vAxEqAz.exeC:\Windows\System32\vAxEqAz.exe2⤵PID:11912
-
-
C:\Windows\System32\nqcazUP.exeC:\Windows\System32\nqcazUP.exe2⤵PID:11936
-
-
C:\Windows\System32\FVQQqxb.exeC:\Windows\System32\FVQQqxb.exe2⤵PID:11956
-
-
C:\Windows\System32\jVDTNGS.exeC:\Windows\System32\jVDTNGS.exe2⤵PID:11980
-
-
C:\Windows\System32\iPPQHUj.exeC:\Windows\System32\iPPQHUj.exe2⤵PID:12008
-
-
C:\Windows\System32\oaGPiDv.exeC:\Windows\System32\oaGPiDv.exe2⤵PID:12040
-
-
C:\Windows\System32\aJnRbbU.exeC:\Windows\System32\aJnRbbU.exe2⤵PID:12112
-
-
C:\Windows\System32\TMsTPEU.exeC:\Windows\System32\TMsTPEU.exe2⤵PID:12156
-
-
C:\Windows\System32\VrnlhYE.exeC:\Windows\System32\VrnlhYE.exe2⤵PID:12200
-
-
C:\Windows\System32\BQEdUJK.exeC:\Windows\System32\BQEdUJK.exe2⤵PID:12224
-
-
C:\Windows\System32\PnSQrcN.exeC:\Windows\System32\PnSQrcN.exe2⤵PID:12244
-
-
C:\Windows\System32\CAhOYJr.exeC:\Windows\System32\CAhOYJr.exe2⤵PID:12264
-
-
C:\Windows\System32\CQLrGPK.exeC:\Windows\System32\CQLrGPK.exe2⤵PID:11280
-
-
C:\Windows\System32\gMzTexx.exeC:\Windows\System32\gMzTexx.exe2⤵PID:11356
-
-
C:\Windows\System32\DEogRLR.exeC:\Windows\System32\DEogRLR.exe2⤵PID:11392
-
-
C:\Windows\System32\gGboNSX.exeC:\Windows\System32\gGboNSX.exe2⤵PID:11424
-
-
C:\Windows\System32\vmRVHDf.exeC:\Windows\System32\vmRVHDf.exe2⤵PID:11488
-
-
C:\Windows\System32\vBlPlJK.exeC:\Windows\System32\vBlPlJK.exe2⤵PID:11472
-
-
C:\Windows\System32\zQkZLNJ.exeC:\Windows\System32\zQkZLNJ.exe2⤵PID:11560
-
-
C:\Windows\System32\tzCHfkD.exeC:\Windows\System32\tzCHfkD.exe2⤵PID:11620
-
-
C:\Windows\System32\jjOMiTR.exeC:\Windows\System32\jjOMiTR.exe2⤵PID:11700
-
-
C:\Windows\System32\xRdKkkG.exeC:\Windows\System32\xRdKkkG.exe2⤵PID:11752
-
-
C:\Windows\System32\pmVbvWK.exeC:\Windows\System32\pmVbvWK.exe2⤵PID:11776
-
-
C:\Windows\System32\qPZeuZv.exeC:\Windows\System32\qPZeuZv.exe2⤵PID:11876
-
-
C:\Windows\System32\oACwcIY.exeC:\Windows\System32\oACwcIY.exe2⤵PID:11964
-
-
C:\Windows\System32\PmrsiST.exeC:\Windows\System32\PmrsiST.exe2⤵PID:12048
-
-
C:\Windows\System32\RgMzRMa.exeC:\Windows\System32\RgMzRMa.exe2⤵PID:4496
-
-
C:\Windows\System32\TJgXpsv.exeC:\Windows\System32\TJgXpsv.exe2⤵PID:4464
-
-
C:\Windows\System32\hIjOKUZ.exeC:\Windows\System32\hIjOKUZ.exe2⤵PID:12216
-
-
C:\Windows\System32\gXsAGmQ.exeC:\Windows\System32\gXsAGmQ.exe2⤵PID:12260
-
-
C:\Windows\System32\xiuHrqw.exeC:\Windows\System32\xiuHrqw.exe2⤵PID:11308
-
-
C:\Windows\System32\gJARcsg.exeC:\Windows\System32\gJARcsg.exe2⤵PID:11552
-
-
C:\Windows\System32\iVzLXTo.exeC:\Windows\System32\iVzLXTo.exe2⤵PID:11588
-
-
C:\Windows\System32\yEguUQG.exeC:\Windows\System32\yEguUQG.exe2⤵PID:11676
-
-
C:\Windows\System32\RRpsBIQ.exeC:\Windows\System32\RRpsBIQ.exe2⤵PID:11988
-
-
C:\Windows\System32\CNbxiIJ.exeC:\Windows\System32\CNbxiIJ.exe2⤵PID:12164
-
-
C:\Windows\System32\argAKTk.exeC:\Windows\System32\argAKTk.exe2⤵PID:12276
-
-
C:\Windows\System32\zxvjDOd.exeC:\Windows\System32\zxvjDOd.exe2⤵PID:11388
-
-
C:\Windows\System32\AkWWJkm.exeC:\Windows\System32\AkWWJkm.exe2⤵PID:11508
-
-
C:\Windows\System32\CwbemhL.exeC:\Windows\System32\CwbemhL.exe2⤵PID:11716
-
-
C:\Windows\System32\bJAFWKe.exeC:\Windows\System32\bJAFWKe.exe2⤵PID:948
-
-
C:\Windows\System32\gVvNwib.exeC:\Windows\System32\gVvNwib.exe2⤵PID:11456
-
-
C:\Windows\System32\cIBlXyl.exeC:\Windows\System32\cIBlXyl.exe2⤵PID:4488
-
-
C:\Windows\System32\NXqjoCM.exeC:\Windows\System32\NXqjoCM.exe2⤵PID:12292
-
-
C:\Windows\System32\wyRPLdC.exeC:\Windows\System32\wyRPLdC.exe2⤵PID:12324
-
-
C:\Windows\System32\XlMhkYt.exeC:\Windows\System32\XlMhkYt.exe2⤵PID:12348
-
-
C:\Windows\System32\kmRIZip.exeC:\Windows\System32\kmRIZip.exe2⤵PID:12368
-
-
C:\Windows\System32\JEjgcTO.exeC:\Windows\System32\JEjgcTO.exe2⤵PID:12388
-
-
C:\Windows\System32\FbMClxp.exeC:\Windows\System32\FbMClxp.exe2⤵PID:12412
-
-
C:\Windows\System32\oKKSFpt.exeC:\Windows\System32\oKKSFpt.exe2⤵PID:12440
-
-
C:\Windows\System32\lgEbXQI.exeC:\Windows\System32\lgEbXQI.exe2⤵PID:12480
-
-
C:\Windows\System32\YerHShX.exeC:\Windows\System32\YerHShX.exe2⤵PID:12500
-
-
C:\Windows\System32\QhMZCDq.exeC:\Windows\System32\QhMZCDq.exe2⤵PID:12536
-
-
C:\Windows\System32\GbiHsKM.exeC:\Windows\System32\GbiHsKM.exe2⤵PID:12556
-
-
C:\Windows\System32\KkOBhqb.exeC:\Windows\System32\KkOBhqb.exe2⤵PID:12576
-
-
C:\Windows\System32\RVaFkGs.exeC:\Windows\System32\RVaFkGs.exe2⤵PID:12612
-
-
C:\Windows\System32\mtsJqAz.exeC:\Windows\System32\mtsJqAz.exe2⤵PID:12648
-
-
C:\Windows\System32\BGFGxST.exeC:\Windows\System32\BGFGxST.exe2⤵PID:12684
-
-
C:\Windows\System32\YLOMMQY.exeC:\Windows\System32\YLOMMQY.exe2⤵PID:12720
-
-
C:\Windows\System32\LtjdnSw.exeC:\Windows\System32\LtjdnSw.exe2⤵PID:12744
-
-
C:\Windows\System32\tRJUBtC.exeC:\Windows\System32\tRJUBtC.exe2⤵PID:12764
-
-
C:\Windows\System32\IwFMFla.exeC:\Windows\System32\IwFMFla.exe2⤵PID:12784
-
-
C:\Windows\System32\AqFXlgV.exeC:\Windows\System32\AqFXlgV.exe2⤵PID:12808
-
-
C:\Windows\System32\oyhnjdL.exeC:\Windows\System32\oyhnjdL.exe2⤵PID:12828
-
-
C:\Windows\System32\CNldwAx.exeC:\Windows\System32\CNldwAx.exe2⤵PID:12856
-
-
C:\Windows\System32\MzHYxnp.exeC:\Windows\System32\MzHYxnp.exe2⤵PID:12884
-
-
C:\Windows\System32\lyCMlMj.exeC:\Windows\System32\lyCMlMj.exe2⤵PID:12908
-
-
C:\Windows\System32\OvWJTRJ.exeC:\Windows\System32\OvWJTRJ.exe2⤵PID:12952
-
-
C:\Windows\System32\zYbJcHM.exeC:\Windows\System32\zYbJcHM.exe2⤵PID:13000
-
-
C:\Windows\System32\iNPDhbo.exeC:\Windows\System32\iNPDhbo.exe2⤵PID:13016
-
-
C:\Windows\System32\dKfQAkS.exeC:\Windows\System32\dKfQAkS.exe2⤵PID:13044
-
-
C:\Windows\System32\rzHraKG.exeC:\Windows\System32\rzHraKG.exe2⤵PID:13068
-
-
C:\Windows\System32\QYwBklC.exeC:\Windows\System32\QYwBklC.exe2⤵PID:13096
-
-
C:\Windows\System32\ocUcuIo.exeC:\Windows\System32\ocUcuIo.exe2⤵PID:13124
-
-
C:\Windows\System32\GDvoinj.exeC:\Windows\System32\GDvoinj.exe2⤵PID:13156
-
-
C:\Windows\System32\UQYWFNK.exeC:\Windows\System32\UQYWFNK.exe2⤵PID:13192
-
-
C:\Windows\System32\LtLmiDS.exeC:\Windows\System32\LtLmiDS.exe2⤵PID:13216
-
-
C:\Windows\System32\kWfNRTk.exeC:\Windows\System32\kWfNRTk.exe2⤵PID:13240
-
-
C:\Windows\System32\yXCpzFg.exeC:\Windows\System32\yXCpzFg.exe2⤵PID:13264
-
-
C:\Windows\System32\ZeLQjlq.exeC:\Windows\System32\ZeLQjlq.exe2⤵PID:13288
-
-
C:\Windows\System32\xJaSvFk.exeC:\Windows\System32\xJaSvFk.exe2⤵PID:12300
-
-
C:\Windows\System32\FvEZfqv.exeC:\Windows\System32\FvEZfqv.exe2⤵PID:12364
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
PID:13180 -
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:12900
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4140
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:456
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:7448
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6264
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:8176
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:8472
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SendNotifyMessage
PID:6072
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3620
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SendNotifyMessage
PID:2584
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:11164
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:8120
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:2888
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:12872
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2736
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:7216
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4812
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6408
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5388
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:8396
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:8716
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:10660
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:11204
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:9376
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:9112
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:11320
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:11680
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:12052
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:12012
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:10632
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:6400
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:13292
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:228
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:12872
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2596
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:7564
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4812
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7216
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3304
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:8792
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:9540
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5344
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:9944
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:9424
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2040
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:12064
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:10820
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:1004
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:11700
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:11944
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6828
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2728
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7144
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:13112
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3380
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7560
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:8504
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:8708
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6068
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:10032
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:8884
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:9640
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:8940
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:12256
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:11400
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4908
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:8348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\U23Z080G\microsoft.windows[1].xml
Filesize97B
MD5292a283bdecf4cd89c3ad863a28bc72f
SHA118e896fec5f8b3ea2963d0a5cb45a244050c35c1
SHA25609794c6006f357000111d7d13c1c20075eaea58f68df78e118d14b4547835ec2
SHA51271349774dcf41cd9e72c881cd374ffaf2527b2156a616cc064f10f34e7bbf0ea6174916acb2b8b06428f2b2f29315359e66dde317965463ea1eb70fef52beaaa
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133602690596309740.txt
Filesize75KB
MD579ea60e4feeffe4483ba2d0ea61852fb
SHA17d5921a1b6240cc717ad4f4478bbcfc42f3af8e8
SHA2561e85f6cd486b20682b1a6af9f34e7993a558f3b5dccd1e80a55178847e794923
SHA5124d0866c2b63af9570fa20bca628a6e67b3704d7ab5a8a1311fb614f38b54444cc6630390092282f075751cae38000a17e4bf1cb992a8900b0c72965c0b24dbf4
-
Filesize
1.9MB
MD572e031aa6428eb4ce77d98fac089ce3b
SHA1ae0ca1587c01d759503069810018bbf646384b55
SHA256ccb1f87c1d9a51b36f5290b41dcdb27a6fb00be9672a8ea593efbde2940fccc8
SHA512f07b1dde7fb7eb3dd4ea70fe7887fc77dcd4e584e34c89962089be625550086499b6ec8634e0ffa5842861185c6f7c13f6dc426334a0d60ec10bb09868bcd2e6
-
Filesize
1.9MB
MD5e56e17373d7e85aaaa73e5810ef2d99a
SHA11cdf0c38a306b2a1ccc79315951420ff926826fa
SHA2564ce722bf709fba056919df17957e6b8eeda84e8b01bdf31534ca7a1fa33a292a
SHA512261f2c8963bdbc2befcf81155b05c0fb529ba1426d28029eda2d03d301ecbf8579501b4aea93f2f1bff8c8fc84bf5e4e7242acbc2867205ca81f8818e1dde129
-
Filesize
1.9MB
MD5dda2141352cc5d8b3ea95465919a6af6
SHA1c9ef58783f1233897368ab62241b733563555cd9
SHA25602d82c30cb191fed55b6441beced248598eb7b42e2c73b4aa6f11d4a2dbd3b5b
SHA51249f86d4da8041e04a41ef21f79d50d6ed855a38038f9e3ecf3a6344789d3872315a769b257b403de214023e0eed45873d5fc4ce6291b80ed60ef8638b44109d6
-
Filesize
1.9MB
MD504d796dbbde383f7a04e625d59a96cee
SHA1c7a7a044e6af7d34c68e6777e6b6d7e719fc2c7e
SHA2568f1af2b1e1764f93d64da9bc91f81396917985e2deb126e28c6248028f48ad2d
SHA512096e100adb286295c3d69ecffe6fa8635d5ba12256d3078d7fbac63497db0e5f6b782bf7cf52a8bc73927ac884b5dd4ccef7d8e84b4fc99aac995150fc88b45a
-
Filesize
1.9MB
MD50df7785b81c390b4093a447d3993d47b
SHA10be23facf336da1123d2ea480bdba78045d52090
SHA256ac956e29a76ad56a6ddad0ac56dd01b7829a929dbfa3ee10b73e961474a8f7aa
SHA512d4d424e894f74301e2c77749126499e085589f4f11c46fd908bf31b3481b8c53f7349a52f0e293d20d444cd326e3c68b894345d31843903b928256eb61a1af2d
-
Filesize
1.9MB
MD503008e2a5434660f826cbdfe02d66f14
SHA1df4f1b2980bbee87a21c39ef86df2a1e7e9b28ca
SHA256ff7e636e11830733d6e4d3e3f7d70697810a896d0670e1143d962deb3c0897f5
SHA51269f57fe5f9ce990c5238ee428d45e0d8193dc6d99c876a1949f61891c4dff3f03f38e8d7b3c3498a4754f71db49eea3e843ee115cf871bdc9cb755f18e8c849e
-
Filesize
1.9MB
MD55c867645228032af41eebb1f16c06374
SHA110d27e569b16c09b9a036738ed5de0bf640a220a
SHA2567a89a72a924740082ac19f389e8185580e690200ceb7046584c4da6c279f21f4
SHA51289d221c6135f303e7cd13d40866be406566c59e78e557f8df6d313060fecf8c83635babfd2674afe4ce62b0cc8c447aa9b17f7843ee200ab1845dc79630457f8
-
Filesize
1.9MB
MD535108b33da4ccd504400470a2c0b8b0e
SHA19fdaaa8d2030da0fcb21f098701398c8c72e42a3
SHA256245b0552ba84c8f9e371ed96342c061b951c1ec8db1641a745c3085046cd8c41
SHA5120666281f77ff191a5055b6eb9d87dc254ea23fc700468faab50ec32d8854b04359637fd26f70a881e67b286805d027ae40397169a8f65de1114f5261f10ff26a
-
Filesize
1.9MB
MD566ddc77c002d151b97be028c2fd5840c
SHA173f41459bc6d8fce9bff9484dc662cb9c1b83362
SHA256ebf6e4a3ae23394978b1c7bd9fe708fa9222e506670367e46c7e6ea772e1f8be
SHA5125009304c0f0440dd7795617e30aa868baca329c11a4da60df96ecd31d3dc300663b4286fd9ba0bc12b6b0ecce840fd2d8ea0ef05e465a0ec14a531d9454b6124
-
Filesize
1.9MB
MD51ed9a7ffce18b4ea486a31dd850ec874
SHA1ce5afd6421a92b9ddc41fefde71270ddaca4f2a1
SHA2560290d7368cacbe84fe5cb40ac043f4fb36618fa991f81873db65bf351c44b37f
SHA512b90d89459a0718baa2ba8058bb00b40e3e345d81baef6074b7672cad116d80ec1451a89a2d7437c48af67548b39b82cd54db2810508a59a44bda247418614cb5
-
Filesize
1.9MB
MD5a431c015dae9acb20d113c0cdaf4096c
SHA1d9989dab3f403fcccecc8c5a67fa5c906eae8036
SHA2567d5d06fd0465decde92376bb68c02fd2c5831b74bb6b96448fc7cfca32f620cc
SHA512606dc395c4d612104e588fc74fe2f58cbe2ddd6dd50034fc0ec7a855a8c4a0d0cc904ca646f2b6c8f1a3bd61677510e746fd3ee4a0c58b96f3896c0b8c285361
-
Filesize
1.9MB
MD50d2f92bb0f06302c1a517a33b47364ab
SHA1030515f810a78e35d1e5a6ee5e5538c1d767b93b
SHA2566735dee14f7682ff0a86fa8154f8723399e5378b57f236e7efd98c9728cc17d4
SHA5125c170d6df7a1e3641d917204ff75fd94a494b16195afd4703f39422e47569adb543fdc1f98b3dc3847a286176329831cad325da110bb1e35e57d2071a5576279
-
Filesize
1.9MB
MD5e5da47bbcfb6aa4949df9e25109d6e2d
SHA17d37dec2b4bec2708cab3b311bc4ee70c5e6c172
SHA2567166d9936baed8c8f38e27f1a2c6adcc9ed1fb8c7e08160544eb15558befc599
SHA512680f0dc8ae73bad19be51f0dbca1dd05d564b4b7cd67e673265e61286e7cfb86da6f28ac0b98ab4af5b1140498b4e942892ce6eb0a1e70ebd4b41e36136ae9d0
-
Filesize
1.9MB
MD592bca365581f0d19216ce9df3fdbecd0
SHA1ae2b17a589587e91fdb423f3137577d6562dd245
SHA256ac1ecdfc25794f973079f8a234b906281fedc4d26783d40d1945270a988d75d3
SHA512921eaa01039d11f6b2738b95857925bd39f2133ee57331fd67a8499809ef2ad75a2fe76f3d25d2b01d2f5673543040ad558b6bc068cc10e86cb961160e139323
-
Filesize
1.9MB
MD5a7b30db101eb3b07627059df8e504f59
SHA1ed0db422cf46cf6c1704da6c271257980df70682
SHA2560edf405617fb7203e5215bc81e6da5331b92cb8e6ed7e17be25c363126f5e4b8
SHA512fcbed18466fb429ff3f121e8cd41906bfe6971876c91f5a47ea187441035ce228f420f7ec0bc2f127565753d69ab3fe932d16ffd1a681ad9e80083402aa94bd9
-
Filesize
1.9MB
MD59219f1a85a0951e568b781317ea1e7aa
SHA105610c11767e0795e7a597c2f9a16f5f131d0428
SHA2562d6e04edba10746377aad319b1e8eb77c4e27f2e86c3ddea9f41f333bfbe6b1a
SHA51282a25d9f3e1c92bab4d41fd28b9f184e588c950a0b780e389d7c8fee1918b96de3b3d94e41898da32003c9cf5c36f2f5f6ef8e19b2d9a33e814dad860f6e8f29
-
Filesize
1.9MB
MD5651fba7f54a01237907d3e7e4d35102d
SHA10ad5308c10f8930fda78ab71491444776deef3a9
SHA256c7d2415643773840810d55df5c5c90a16ac261ad0b947aeea424a5a9436d792c
SHA51297321fdbe3cbd466257c3b9d30a899576e693c28d4d2b5ae97c0abebaf62a56da247959127dcd281128f30e35830cf665fce260676f39eedaa0439fcdf2712ce
-
Filesize
1.9MB
MD593f645ec9057628366a961fc45c2e179
SHA1446715898ef27ec75102658039ad9dc9438b3017
SHA2563daf1b2fb68c196d15a62446626e5c061117dce05399c68d7d3e56d485127ad1
SHA512202c2963c1ed3c8fa0457a3e163978665f8f0f7866c6670bdc0b1cd1ebe62b5cf54ec339cbaecfc0a09b700042c2b18ef8bd7997bd62967e85961d90cb7a4b10
-
Filesize
1.9MB
MD5473fb7a067e9e320751d2ccc4f2a5f39
SHA18b1bd3c98ae72f8910ab4669ba35898ce9c423ef
SHA256657ac1725cf4c0a0868505e6af0dca3cd969864d70ad844cba4e96195d72abce
SHA5120b767d8f2a70b2ffd9e37cd9b0f97d734845c835a08bb4964211e2bb126c1c5fabcd7fb2a751d9bd87c32002565f416c401504522f000260df1b1e6885651e17
-
Filesize
1.9MB
MD5ba435c6731508de1e70e05407de61c1e
SHA17924f53358497ee9b1e8d90c222d309d4dba5cc9
SHA25624e86d71427aa49a0b59963eb9c9598151118811443fa1bcccc66a23e24c4204
SHA5123c46788b3f4e412abc076398dccad20290c4b04a26f8e3edbfbaed7fae4bf44bd24a8528feb2e4f85521d9e66a552ef93d477d3d124bd415218cbd62002a43ba
-
Filesize
1.9MB
MD5bbe3ee833b991f53b57cf5374a5020c8
SHA1823df6f1031c21ae2bb81c3e767adbb8da7dde6b
SHA2564d08e22a355c1a56e7ca0972b37dc5b4eea6ad8d0a792ad942c3faaeeed1572c
SHA51222a670bab95cf5928461615730840cc5b63eedce1b71c4fa59b6577bc5b43df6c0dc1c2a11b1e091ce9d66cbaeb9b9bd6cc769b537c2264b1bcd752fc3384c27
-
Filesize
1.9MB
MD50215f5989ead5414dc2716028dae07dd
SHA1bee54020b75a6d88a5b7205a25bf66ac2033dcb7
SHA2563ca0bf4591bdd9f8ea4b1dc28192041d7d63203ccad770dd88d684b353d1fdbb
SHA51257f0dbec3eb5092ff2562ff8b2964eb3d524330a988c0d315c97f3aeddddfb7aea56f83331724c4d2590b6b937feb1bf3f75d64c812379f6125f8da73ba149d4
-
Filesize
1.9MB
MD55a03ee1188f8c259e835e2329188d90f
SHA1a775b17d279efe6495d7223b398592729d2e4137
SHA2566c2b2de056dbc826eee8658525b603d668ddad12a47c76ed3b7ac0f7ac7f0880
SHA512492edacb1f86780c58d73ac0ffc28fd0007f92353b26b9ef821f128476498e38cffa09c9503ce5d84f37661fc73ae810dc7b58e7d5224907f786f77f440ea11d
-
Filesize
1.9MB
MD581765cfee320dbff5bac9aab85fabcc2
SHA1e051458bda6adb79451b201b2989b376febb3842
SHA2564cacef1f8f2a190844d493e01e1e057d74879129fdb7af14eecfdb71fec43375
SHA5123d2ecf8a7d3b073da96fd682b669db0f7e1c40fdd4401245f73549cbb1600dc142d5fe0b5f18e518c4fe8f8f838898010c3e1b79b61f1fe4b19687cf11fa27c1
-
Filesize
1.9MB
MD5dfc373bdff88441038bd7aa29bcf1e1e
SHA1c6668abb12519b2436489e5203645004c329daa0
SHA2568e511c1fff8bac4cc44943ef498942cb90d0ae06d91d50b40ad3e987b7189b42
SHA5124922a3599a4081d00ee53c18dc8e2ecdbf34f3f2d9c7a9d6acdb7f4d2dbb5e13fecda26e9e51062863689385178365b7246e0cd878e248074227b7fb14ffb6e7
-
Filesize
1.9MB
MD5ee640fa10f901c5efacb4596f373ea75
SHA10d1974f2e3d44f2e26bd539561529d0fb10b1478
SHA25677bb2f4241608cda405e1a42b17fbf7784060ebc7c2ef1016402e72d7d05d8ba
SHA512d120d888cc5da26c7b12b043cc77cf89fd15c32ac22a3d2bbd6599e6b65003b68945172b3cec0f5075ee2b12380af0764ac60db2d4d655c92aa879943e98e950
-
Filesize
1.9MB
MD56648dc43fc506e50eb92342efcac2bf5
SHA16d1372c855b494b8a00609a86341d98c950cf92f
SHA2569d6b1304775586f5f1cb072ba19db28c19283c73fc3fcdf2d879530468215487
SHA512a5f50ba88820465c01c7a2972352deebd48f821a015696961a560828b73fc84b4174d1ba41335916f024aec5a4887324156cef69002bb9f4abbb496c4bdf90cd
-
Filesize
1.9MB
MD5ae9bcdfe77d6676b113748af0c147c2c
SHA17618c4dde3a097f73f5414cf404ea0a7223f5fda
SHA2560e8f47acab5d98291b13ef5504561c429eece9b806ce6b850dfbb7ac31693258
SHA5126fa8ff5c8bcfc7dba170b58457d2372359092d5b5f50ae6d4fa895bfcdeed0fa28a12379f596590c6137210961f934058c2497abdb87cd4aeacde3a66e48ddd0
-
Filesize
1.9MB
MD583ad175549a68d0c0255d5fa895e4514
SHA1f52e19b9a552d912e70672b2b016abedd2103c5a
SHA25629d25e74e6bb4731396374498ce171f6ce8ec1740ea5da44551b3ffbdd6b3fae
SHA512969cef625600545892ab3c79eb8a158a5be705b027ca5d8d01a4860eaec359aab35af5ac184da54581046eac6a43d57e6405f708f89eb695852e97b79e84b0d7
-
Filesize
1.9MB
MD5ccbc2f6d34e0d53605760bb0b2f17287
SHA1b07a235574a77747e307e06e0db32f0902274f0c
SHA25695b8dc061042e349c5e71d5ceb91eedeba3b294cc27ff00709536bc0937bc7a3
SHA512253bdaf50210f7ab432d977194b1fb0f92b20f84d7ed9ed8688ff4223b987d1565ed619bbde8ad2947eaa9ac20a9e740166bd2badd12fbcfb8db007093bf3d88
-
Filesize
1.9MB
MD5091375b892e8e992d144f6cdf98e27eb
SHA196f966989b3c0a5778f4d04fb9f077130aafa782
SHA256340ab5db59eef63096f16c2b9f505c7a24f47331ab4b4d5fe29764a808ce9be7
SHA51232d8581f4db7a8be9ce3ff551ac04ba771151744815bf658ad2dae545fe7561787b8ee93de0b7659d93010b214b6eee119887d04f2363be61c812c2462e0fadf
-
Filesize
1.9MB
MD556905a175bc1fba081ec13cef8ee982b
SHA13a30a87db0e1d3ef7198aad19fdda6da41b1e65c
SHA2566ff299df313cf4e70f7f6b02b6a86f5c8a824ba01fa8b8fd2199eb212a3b1fad
SHA5126332b037141d9b6121a6d1a588c37122080191f5b61fd41146cfb10eb9e617faa9bf5b47e64a35ee932aeceff2c33fac1abae4821117b59981de76e91bb727ed