Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:52
Behavioral task
behavioral1
Sample
71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
71ddb467024c6c846404b47dd76173c0
-
SHA1
f543003998974661435cb47edc1e1a60489da9d8
-
SHA256
c0f1568bdf5d5fb3ef1beb5e7da9648ddca67b90d176cb0494007871e0f9ceda
-
SHA512
59e4b4886114e8e61e928b7a98f833863458a153610c3904fb627d30e5fa597ad75cf95fc13f7f21ccdf07bc6b6ebfcf893d2589f1edb4c62212a24f0b968ae2
-
SSDEEP
24576:GezaTnG99Q8FcNrpyNdfE0bLBgDOp2iSLz9LbBwlKensYKkzGUfiI7pXu3ajGEw4:GezaTF8FcNkNdfE0pZ9oztFwI6KQGyXt
Malware Config
Signatures
-
XMRig Miner payload 32 IoCs
Processes:
resource yara_rule C:\Windows\system\mPCHTrR.exe xmrig C:\Windows\system\YgEClni.exe xmrig C:\Windows\system\lAAOQCw.exe xmrig C:\Windows\system\goUZsCi.exe xmrig \Windows\system\lPmXQSx.exe xmrig \Windows\system\VeAlrMm.exe xmrig C:\Windows\system\GYQwMJb.exe xmrig C:\Windows\system\BZBBgbw.exe xmrig \Windows\system\QFWnHjq.exe xmrig C:\Windows\system\MIDdUjn.exe xmrig C:\Windows\system\bqdjMyJ.exe xmrig C:\Windows\system\oStDytC.exe xmrig C:\Windows\system\rSOtHvv.exe xmrig C:\Windows\system\sMoDJsA.exe xmrig C:\Windows\system\HQMtlxe.exe xmrig C:\Windows\system\txAepgq.exe xmrig C:\Windows\system\eiEwOUx.exe xmrig C:\Windows\system\KtaTRLC.exe xmrig C:\Windows\system\EAmsvLB.exe xmrig C:\Windows\system\nTWEFHQ.exe xmrig C:\Windows\system\pVFhqfg.exe xmrig C:\Windows\system\nHMyxpk.exe xmrig C:\Windows\system\UWZtctp.exe xmrig C:\Windows\system\hTUTTeK.exe xmrig \Windows\system\eiRdHUs.exe xmrig C:\Windows\system\NybjAzo.exe xmrig C:\Windows\system\qOuvOxf.exe xmrig C:\Windows\system\yzoRdfA.exe xmrig C:\Windows\system\jBgATWt.exe xmrig C:\Windows\system\BwWhIIT.exe xmrig C:\Windows\system\QUFppFD.exe xmrig C:\Windows\system\neyokwS.exe xmrig -
Executes dropped EXE 64 IoCs
Processes:
mPCHTrR.exeneyokwS.exeYgEClni.exeQUFppFD.exeBwWhIIT.exelAAOQCw.exegoUZsCi.exelPmXQSx.exejBgATWt.exeVeAlrMm.exeGYQwMJb.exeyzoRdfA.exeqOuvOxf.exeNybjAzo.exeeiRdHUs.exeBZBBgbw.exeUWZtctp.exehTUTTeK.exeQFWnHjq.exenHMyxpk.exeMIDdUjn.exepVFhqfg.exenTWEFHQ.exeEAmsvLB.exeKtaTRLC.exebqdjMyJ.exeeiEwOUx.exetxAepgq.exesMoDJsA.exeHQMtlxe.exeoStDytC.exerSOtHvv.exesBsGmgW.exeWxcAWiZ.exegiasSpP.exebtmGItm.exeJYvnOMw.exeCNGkjXR.exeFYusbLG.exeuejHZpc.exeMYCBvzX.exepefXsmo.exeFVqItCa.exeRTVUgRu.exeCIUdtrs.exeBYqalsT.exevZKVezK.exeKznpyef.exeehxktlE.exeCZYgpGY.exefNQtNtj.exeXBJwzcG.exeZCwWkVt.exeJqtfeCs.exeHYJFeLA.exefUCAltj.exewIOzzHC.exewpEEKHP.exeDTtzwjw.exegpdYKTE.exeCXMZQFE.exeCfBVHPz.exeimMnvmK.exesOhcjBO.exepid process 1708 mPCHTrR.exe 2080 neyokwS.exe 3024 YgEClni.exe 2588 QUFppFD.exe 2700 BwWhIIT.exe 2600 lAAOQCw.exe 2748 goUZsCi.exe 2560 lPmXQSx.exe 2760 jBgATWt.exe 2580 VeAlrMm.exe 548 GYQwMJb.exe 2476 yzoRdfA.exe 2332 qOuvOxf.exe 2496 NybjAzo.exe 2460 eiRdHUs.exe 2684 BZBBgbw.exe 2772 UWZtctp.exe 2912 hTUTTeK.exe 1672 QFWnHjq.exe 2304 nHMyxpk.exe 1932 MIDdUjn.exe 2032 pVFhqfg.exe 1568 nTWEFHQ.exe 1540 EAmsvLB.exe 872 KtaTRLC.exe 376 bqdjMyJ.exe 1252 eiEwOUx.exe 2076 txAepgq.exe 2292 sMoDJsA.exe 2668 HQMtlxe.exe 2168 oStDytC.exe 772 rSOtHvv.exe 324 sBsGmgW.exe 896 WxcAWiZ.exe 1004 giasSpP.exe 584 btmGItm.exe 1100 JYvnOMw.exe 1864 CNGkjXR.exe 1788 FYusbLG.exe 2412 uejHZpc.exe 1820 MYCBvzX.exe 2964 pefXsmo.exe 2044 FVqItCa.exe 1056 RTVUgRu.exe 1604 CIUdtrs.exe 1552 BYqalsT.exe 1348 vZKVezK.exe 2400 Kznpyef.exe 2960 ehxktlE.exe 2424 CZYgpGY.exe 112 fNQtNtj.exe 2056 XBJwzcG.exe 1748 ZCwWkVt.exe 1128 JqtfeCs.exe 572 HYJFeLA.exe 3048 fUCAltj.exe 760 wIOzzHC.exe 1520 wpEEKHP.exe 356 DTtzwjw.exe 3016 gpdYKTE.exe 1660 CXMZQFE.exe 1624 CfBVHPz.exe 1616 imMnvmK.exe 2940 sOhcjBO.exe -
Loads dropped DLL 64 IoCs
Processes:
71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exepid process 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe -
Drops file in Windows directory 64 IoCs
Processes:
71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exedescription ioc process File created C:\Windows\System\GZQbWaD.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\mPCHTrR.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\EAmsvLB.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\YdUGxtx.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\nqxhEXt.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\jQgNyeZ.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\GUDAZTv.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\jHiwIUr.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\GFCObtt.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\zsiaCXM.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\txAepgq.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\fUCAltj.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\GgpTTsT.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\bqdjMyJ.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\DTtzwjw.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\nHMyxpk.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\sBsGmgW.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\LeXvyPr.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\iBALhkY.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\Kznpyef.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\aZMGJai.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\yzoRdfA.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\cxlhbxH.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\FYusbLG.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\QzvfITr.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\eHKvbVk.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\QhpJaHw.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\nDJIZaV.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\YwltsFI.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\GLQcTwL.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\oFyYmFm.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\vrMFbXq.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\lAAOQCw.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\nTWEFHQ.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\HBGklDT.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\SwdyaMo.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\EKSbAHR.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\TacgIZY.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\acPnIUA.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\FKVEjZy.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\DoFqYwV.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\sMoDJsA.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\BTKotPZ.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\yEWUlAi.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\iaAEDLz.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\CkIXlvG.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\YgEClni.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\QFWnHjq.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\tAZOmvc.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\lFrXWVO.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\qbkevUY.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\uejHZpc.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\MQAhqXr.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\wIOzzHC.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\ApHkwoY.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\nzxIAOG.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\OwEAvSP.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\FbpOItr.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\JYvnOMw.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\JqtfeCs.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\aVOeGrb.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\AhxzXCp.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\XbbFHcE.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe File created C:\Windows\System\sYVhAOK.exe 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exedescription pid process Token: SeLockMemoryPrivilege 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe Token: SeLockMemoryPrivilege 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exedescription pid process target process PID 2868 wrote to memory of 1708 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe mPCHTrR.exe PID 2868 wrote to memory of 1708 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe mPCHTrR.exe PID 2868 wrote to memory of 1708 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe mPCHTrR.exe PID 2868 wrote to memory of 2080 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe neyokwS.exe PID 2868 wrote to memory of 2080 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe neyokwS.exe PID 2868 wrote to memory of 2080 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe neyokwS.exe PID 2868 wrote to memory of 3024 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe YgEClni.exe PID 2868 wrote to memory of 3024 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe YgEClni.exe PID 2868 wrote to memory of 3024 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe YgEClni.exe PID 2868 wrote to memory of 2588 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe QUFppFD.exe PID 2868 wrote to memory of 2588 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe QUFppFD.exe PID 2868 wrote to memory of 2588 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe QUFppFD.exe PID 2868 wrote to memory of 2700 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe BwWhIIT.exe PID 2868 wrote to memory of 2700 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe BwWhIIT.exe PID 2868 wrote to memory of 2700 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe BwWhIIT.exe PID 2868 wrote to memory of 2600 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe lAAOQCw.exe PID 2868 wrote to memory of 2600 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe lAAOQCw.exe PID 2868 wrote to memory of 2600 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe lAAOQCw.exe PID 2868 wrote to memory of 2748 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe goUZsCi.exe PID 2868 wrote to memory of 2748 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe goUZsCi.exe PID 2868 wrote to memory of 2748 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe goUZsCi.exe PID 2868 wrote to memory of 2560 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe lPmXQSx.exe PID 2868 wrote to memory of 2560 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe lPmXQSx.exe PID 2868 wrote to memory of 2560 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe lPmXQSx.exe PID 2868 wrote to memory of 2760 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe jBgATWt.exe PID 2868 wrote to memory of 2760 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe jBgATWt.exe PID 2868 wrote to memory of 2760 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe jBgATWt.exe PID 2868 wrote to memory of 2580 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe VeAlrMm.exe PID 2868 wrote to memory of 2580 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe VeAlrMm.exe PID 2868 wrote to memory of 2580 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe VeAlrMm.exe PID 2868 wrote to memory of 548 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe GYQwMJb.exe PID 2868 wrote to memory of 548 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe GYQwMJb.exe PID 2868 wrote to memory of 548 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe GYQwMJb.exe PID 2868 wrote to memory of 2476 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe yzoRdfA.exe PID 2868 wrote to memory of 2476 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe yzoRdfA.exe PID 2868 wrote to memory of 2476 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe yzoRdfA.exe PID 2868 wrote to memory of 2332 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe qOuvOxf.exe PID 2868 wrote to memory of 2332 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe qOuvOxf.exe PID 2868 wrote to memory of 2332 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe qOuvOxf.exe PID 2868 wrote to memory of 2496 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe NybjAzo.exe PID 2868 wrote to memory of 2496 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe NybjAzo.exe PID 2868 wrote to memory of 2496 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe NybjAzo.exe PID 2868 wrote to memory of 2460 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe eiRdHUs.exe PID 2868 wrote to memory of 2460 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe eiRdHUs.exe PID 2868 wrote to memory of 2460 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe eiRdHUs.exe PID 2868 wrote to memory of 2684 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe BZBBgbw.exe PID 2868 wrote to memory of 2684 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe BZBBgbw.exe PID 2868 wrote to memory of 2684 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe BZBBgbw.exe PID 2868 wrote to memory of 2772 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe UWZtctp.exe PID 2868 wrote to memory of 2772 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe UWZtctp.exe PID 2868 wrote to memory of 2772 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe UWZtctp.exe PID 2868 wrote to memory of 2912 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe hTUTTeK.exe PID 2868 wrote to memory of 2912 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe hTUTTeK.exe PID 2868 wrote to memory of 2912 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe hTUTTeK.exe PID 2868 wrote to memory of 1672 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe QFWnHjq.exe PID 2868 wrote to memory of 1672 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe QFWnHjq.exe PID 2868 wrote to memory of 1672 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe QFWnHjq.exe PID 2868 wrote to memory of 2304 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe nHMyxpk.exe PID 2868 wrote to memory of 2304 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe nHMyxpk.exe PID 2868 wrote to memory of 2304 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe nHMyxpk.exe PID 2868 wrote to memory of 1932 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe MIDdUjn.exe PID 2868 wrote to memory of 1932 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe MIDdUjn.exe PID 2868 wrote to memory of 1932 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe MIDdUjn.exe PID 2868 wrote to memory of 2032 2868 71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe pVFhqfg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\71ddb467024c6c846404b47dd76173c0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\mPCHTrR.exeC:\Windows\System\mPCHTrR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\neyokwS.exeC:\Windows\System\neyokwS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YgEClni.exeC:\Windows\System\YgEClni.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QUFppFD.exeC:\Windows\System\QUFppFD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BwWhIIT.exeC:\Windows\System\BwWhIIT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lAAOQCw.exeC:\Windows\System\lAAOQCw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\goUZsCi.exeC:\Windows\System\goUZsCi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lPmXQSx.exeC:\Windows\System\lPmXQSx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jBgATWt.exeC:\Windows\System\jBgATWt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VeAlrMm.exeC:\Windows\System\VeAlrMm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GYQwMJb.exeC:\Windows\System\GYQwMJb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yzoRdfA.exeC:\Windows\System\yzoRdfA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qOuvOxf.exeC:\Windows\System\qOuvOxf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NybjAzo.exeC:\Windows\System\NybjAzo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\eiRdHUs.exeC:\Windows\System\eiRdHUs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BZBBgbw.exeC:\Windows\System\BZBBgbw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UWZtctp.exeC:\Windows\System\UWZtctp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\hTUTTeK.exeC:\Windows\System\hTUTTeK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QFWnHjq.exeC:\Windows\System\QFWnHjq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nHMyxpk.exeC:\Windows\System\nHMyxpk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MIDdUjn.exeC:\Windows\System\MIDdUjn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pVFhqfg.exeC:\Windows\System\pVFhqfg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nTWEFHQ.exeC:\Windows\System\nTWEFHQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EAmsvLB.exeC:\Windows\System\EAmsvLB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bqdjMyJ.exeC:\Windows\System\bqdjMyJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KtaTRLC.exeC:\Windows\System\KtaTRLC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\eiEwOUx.exeC:\Windows\System\eiEwOUx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\txAepgq.exeC:\Windows\System\txAepgq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sMoDJsA.exeC:\Windows\System\sMoDJsA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HQMtlxe.exeC:\Windows\System\HQMtlxe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oStDytC.exeC:\Windows\System\oStDytC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rSOtHvv.exeC:\Windows\System\rSOtHvv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sBsGmgW.exeC:\Windows\System\sBsGmgW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WxcAWiZ.exeC:\Windows\System\WxcAWiZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\giasSpP.exeC:\Windows\System\giasSpP.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\btmGItm.exeC:\Windows\System\btmGItm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JYvnOMw.exeC:\Windows\System\JYvnOMw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CNGkjXR.exeC:\Windows\System\CNGkjXR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FYusbLG.exeC:\Windows\System\FYusbLG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uejHZpc.exeC:\Windows\System\uejHZpc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MYCBvzX.exeC:\Windows\System\MYCBvzX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pefXsmo.exeC:\Windows\System\pefXsmo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FVqItCa.exeC:\Windows\System\FVqItCa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RTVUgRu.exeC:\Windows\System\RTVUgRu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CIUdtrs.exeC:\Windows\System\CIUdtrs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BYqalsT.exeC:\Windows\System\BYqalsT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vZKVezK.exeC:\Windows\System\vZKVezK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\Kznpyef.exeC:\Windows\System\Kznpyef.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ehxktlE.exeC:\Windows\System\ehxktlE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CZYgpGY.exeC:\Windows\System\CZYgpGY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fNQtNtj.exeC:\Windows\System\fNQtNtj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XBJwzcG.exeC:\Windows\System\XBJwzcG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZCwWkVt.exeC:\Windows\System\ZCwWkVt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JqtfeCs.exeC:\Windows\System\JqtfeCs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HYJFeLA.exeC:\Windows\System\HYJFeLA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fUCAltj.exeC:\Windows\System\fUCAltj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wIOzzHC.exeC:\Windows\System\wIOzzHC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wpEEKHP.exeC:\Windows\System\wpEEKHP.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DTtzwjw.exeC:\Windows\System\DTtzwjw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gpdYKTE.exeC:\Windows\System\gpdYKTE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CXMZQFE.exeC:\Windows\System\CXMZQFE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CfBVHPz.exeC:\Windows\System\CfBVHPz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\imMnvmK.exeC:\Windows\System\imMnvmK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sOhcjBO.exeC:\Windows\System\sOhcjBO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wKMXiKq.exeC:\Windows\System\wKMXiKq.exe2⤵
-
C:\Windows\System\mNQeNbf.exeC:\Windows\System\mNQeNbf.exe2⤵
-
C:\Windows\System\QYmmwOn.exeC:\Windows\System\QYmmwOn.exe2⤵
-
C:\Windows\System\nzxIAOG.exeC:\Windows\System\nzxIAOG.exe2⤵
-
C:\Windows\System\iQlshSk.exeC:\Windows\System\iQlshSk.exe2⤵
-
C:\Windows\System\MYpnehp.exeC:\Windows\System\MYpnehp.exe2⤵
-
C:\Windows\System\eiRADAa.exeC:\Windows\System\eiRADAa.exe2⤵
-
C:\Windows\System\SwdyaMo.exeC:\Windows\System\SwdyaMo.exe2⤵
-
C:\Windows\System\rTExJKc.exeC:\Windows\System\rTExJKc.exe2⤵
-
C:\Windows\System\zXRXXBh.exeC:\Windows\System\zXRXXBh.exe2⤵
-
C:\Windows\System\TMWIDtk.exeC:\Windows\System\TMWIDtk.exe2⤵
-
C:\Windows\System\wZUBqIr.exeC:\Windows\System\wZUBqIr.exe2⤵
-
C:\Windows\System\UZAlhzI.exeC:\Windows\System\UZAlhzI.exe2⤵
-
C:\Windows\System\sYVhAOK.exeC:\Windows\System\sYVhAOK.exe2⤵
-
C:\Windows\System\ANTQsAp.exeC:\Windows\System\ANTQsAp.exe2⤵
-
C:\Windows\System\JYBCvlN.exeC:\Windows\System\JYBCvlN.exe2⤵
-
C:\Windows\System\PApIpiZ.exeC:\Windows\System\PApIpiZ.exe2⤵
-
C:\Windows\System\GgpTTsT.exeC:\Windows\System\GgpTTsT.exe2⤵
-
C:\Windows\System\RVJGrwF.exeC:\Windows\System\RVJGrwF.exe2⤵
-
C:\Windows\System\BDRmpOw.exeC:\Windows\System\BDRmpOw.exe2⤵
-
C:\Windows\System\bxpFfET.exeC:\Windows\System\bxpFfET.exe2⤵
-
C:\Windows\System\tAZOmvc.exeC:\Windows\System\tAZOmvc.exe2⤵
-
C:\Windows\System\ApHkwoY.exeC:\Windows\System\ApHkwoY.exe2⤵
-
C:\Windows\System\TacgIZY.exeC:\Windows\System\TacgIZY.exe2⤵
-
C:\Windows\System\ZsREGwE.exeC:\Windows\System\ZsREGwE.exe2⤵
-
C:\Windows\System\HgTwwVm.exeC:\Windows\System\HgTwwVm.exe2⤵
-
C:\Windows\System\vxSLENH.exeC:\Windows\System\vxSLENH.exe2⤵
-
C:\Windows\System\RLwWhfl.exeC:\Windows\System\RLwWhfl.exe2⤵
-
C:\Windows\System\AhxzXCp.exeC:\Windows\System\AhxzXCp.exe2⤵
-
C:\Windows\System\AzOvdqJ.exeC:\Windows\System\AzOvdqJ.exe2⤵
-
C:\Windows\System\cQxKWjV.exeC:\Windows\System\cQxKWjV.exe2⤵
-
C:\Windows\System\ZaZPsUv.exeC:\Windows\System\ZaZPsUv.exe2⤵
-
C:\Windows\System\cwlWnJE.exeC:\Windows\System\cwlWnJE.exe2⤵
-
C:\Windows\System\LeXvyPr.exeC:\Windows\System\LeXvyPr.exe2⤵
-
C:\Windows\System\ubsdtyq.exeC:\Windows\System\ubsdtyq.exe2⤵
-
C:\Windows\System\DQWmGfB.exeC:\Windows\System\DQWmGfB.exe2⤵
-
C:\Windows\System\DfFhUtK.exeC:\Windows\System\DfFhUtK.exe2⤵
-
C:\Windows\System\aVOeGrb.exeC:\Windows\System\aVOeGrb.exe2⤵
-
C:\Windows\System\vUSOjEF.exeC:\Windows\System\vUSOjEF.exe2⤵
-
C:\Windows\System\dAHHqdN.exeC:\Windows\System\dAHHqdN.exe2⤵
-
C:\Windows\System\jQgNyeZ.exeC:\Windows\System\jQgNyeZ.exe2⤵
-
C:\Windows\System\HBGklDT.exeC:\Windows\System\HBGklDT.exe2⤵
-
C:\Windows\System\GUDAZTv.exeC:\Windows\System\GUDAZTv.exe2⤵
-
C:\Windows\System\KLTDJtM.exeC:\Windows\System\KLTDJtM.exe2⤵
-
C:\Windows\System\fDXdDDf.exeC:\Windows\System\fDXdDDf.exe2⤵
-
C:\Windows\System\YIKnqOM.exeC:\Windows\System\YIKnqOM.exe2⤵
-
C:\Windows\System\CwjMypA.exeC:\Windows\System\CwjMypA.exe2⤵
-
C:\Windows\System\ehXpHvg.exeC:\Windows\System\ehXpHvg.exe2⤵
-
C:\Windows\System\nDJIZaV.exeC:\Windows\System\nDJIZaV.exe2⤵
-
C:\Windows\System\tXfExQz.exeC:\Windows\System\tXfExQz.exe2⤵
-
C:\Windows\System\KyTuEsw.exeC:\Windows\System\KyTuEsw.exe2⤵
-
C:\Windows\System\alWJpej.exeC:\Windows\System\alWJpej.exe2⤵
-
C:\Windows\System\IJNBAqR.exeC:\Windows\System\IJNBAqR.exe2⤵
-
C:\Windows\System\nqxhEXt.exeC:\Windows\System\nqxhEXt.exe2⤵
-
C:\Windows\System\HkgbJDv.exeC:\Windows\System\HkgbJDv.exe2⤵
-
C:\Windows\System\YwltsFI.exeC:\Windows\System\YwltsFI.exe2⤵
-
C:\Windows\System\iBALhkY.exeC:\Windows\System\iBALhkY.exe2⤵
-
C:\Windows\System\GLQcTwL.exeC:\Windows\System\GLQcTwL.exe2⤵
-
C:\Windows\System\ctitgcu.exeC:\Windows\System\ctitgcu.exe2⤵
-
C:\Windows\System\oFyYmFm.exeC:\Windows\System\oFyYmFm.exe2⤵
-
C:\Windows\System\lFrXWVO.exeC:\Windows\System\lFrXWVO.exe2⤵
-
C:\Windows\System\qbkevUY.exeC:\Windows\System\qbkevUY.exe2⤵
-
C:\Windows\System\zUdOdhf.exeC:\Windows\System\zUdOdhf.exe2⤵
-
C:\Windows\System\Nlrxulu.exeC:\Windows\System\Nlrxulu.exe2⤵
-
C:\Windows\System\EVNwxkM.exeC:\Windows\System\EVNwxkM.exe2⤵
-
C:\Windows\System\lPIihmP.exeC:\Windows\System\lPIihmP.exe2⤵
-
C:\Windows\System\tOJRSJY.exeC:\Windows\System\tOJRSJY.exe2⤵
-
C:\Windows\System\YzBVAVP.exeC:\Windows\System\YzBVAVP.exe2⤵
-
C:\Windows\System\EKSbAHR.exeC:\Windows\System\EKSbAHR.exe2⤵
-
C:\Windows\System\ZshqEqT.exeC:\Windows\System\ZshqEqT.exe2⤵
-
C:\Windows\System\XbbFHcE.exeC:\Windows\System\XbbFHcE.exe2⤵
-
C:\Windows\System\zHWQqyi.exeC:\Windows\System\zHWQqyi.exe2⤵
-
C:\Windows\System\Vdnrdol.exeC:\Windows\System\Vdnrdol.exe2⤵
-
C:\Windows\System\OtHcJdE.exeC:\Windows\System\OtHcJdE.exe2⤵
-
C:\Windows\System\FbRXkat.exeC:\Windows\System\FbRXkat.exe2⤵
-
C:\Windows\System\QzvfITr.exeC:\Windows\System\QzvfITr.exe2⤵
-
C:\Windows\System\GGMmjaA.exeC:\Windows\System\GGMmjaA.exe2⤵
-
C:\Windows\System\BTKotPZ.exeC:\Windows\System\BTKotPZ.exe2⤵
-
C:\Windows\System\MQAhqXr.exeC:\Windows\System\MQAhqXr.exe2⤵
-
C:\Windows\System\aZMGJai.exeC:\Windows\System\aZMGJai.exe2⤵
-
C:\Windows\System\FKVEjZy.exeC:\Windows\System\FKVEjZy.exe2⤵
-
C:\Windows\System\nYkRqkf.exeC:\Windows\System\nYkRqkf.exe2⤵
-
C:\Windows\System\GniBFtL.exeC:\Windows\System\GniBFtL.exe2⤵
-
C:\Windows\System\yEWUlAi.exeC:\Windows\System\yEWUlAi.exe2⤵
-
C:\Windows\System\mTgUMgT.exeC:\Windows\System\mTgUMgT.exe2⤵
-
C:\Windows\System\PnQsiCC.exeC:\Windows\System\PnQsiCC.exe2⤵
-
C:\Windows\System\vrMFbXq.exeC:\Windows\System\vrMFbXq.exe2⤵
-
C:\Windows\System\iaAEDLz.exeC:\Windows\System\iaAEDLz.exe2⤵
-
C:\Windows\System\WKAHEsd.exeC:\Windows\System\WKAHEsd.exe2⤵
-
C:\Windows\System\hBqseOe.exeC:\Windows\System\hBqseOe.exe2⤵
-
C:\Windows\System\wKZRdHB.exeC:\Windows\System\wKZRdHB.exe2⤵
-
C:\Windows\System\AhTUGdi.exeC:\Windows\System\AhTUGdi.exe2⤵
-
C:\Windows\System\BzUGwEN.exeC:\Windows\System\BzUGwEN.exe2⤵
-
C:\Windows\System\YdUGxtx.exeC:\Windows\System\YdUGxtx.exe2⤵
-
C:\Windows\System\WqiNOsf.exeC:\Windows\System\WqiNOsf.exe2⤵
-
C:\Windows\System\jHiwIUr.exeC:\Windows\System\jHiwIUr.exe2⤵
-
C:\Windows\System\xDushPH.exeC:\Windows\System\xDushPH.exe2⤵
-
C:\Windows\System\FpflOYW.exeC:\Windows\System\FpflOYW.exe2⤵
-
C:\Windows\System\hOAmKgI.exeC:\Windows\System\hOAmKgI.exe2⤵
-
C:\Windows\System\KPKHIrP.exeC:\Windows\System\KPKHIrP.exe2⤵
-
C:\Windows\System\CkIXlvG.exeC:\Windows\System\CkIXlvG.exe2⤵
-
C:\Windows\System\YZGNTdR.exeC:\Windows\System\YZGNTdR.exe2⤵
-
C:\Windows\System\DoFqYwV.exeC:\Windows\System\DoFqYwV.exe2⤵
-
C:\Windows\System\VoBzyJJ.exeC:\Windows\System\VoBzyJJ.exe2⤵
-
C:\Windows\System\QhpJaHw.exeC:\Windows\System\QhpJaHw.exe2⤵
-
C:\Windows\System\jTHZAou.exeC:\Windows\System\jTHZAou.exe2⤵
-
C:\Windows\System\ddpmYTE.exeC:\Windows\System\ddpmYTE.exe2⤵
-
C:\Windows\System\SPgTvDs.exeC:\Windows\System\SPgTvDs.exe2⤵
-
C:\Windows\System\bZcUBnQ.exeC:\Windows\System\bZcUBnQ.exe2⤵
-
C:\Windows\System\BNZgHJu.exeC:\Windows\System\BNZgHJu.exe2⤵
-
C:\Windows\System\AvhtOEv.exeC:\Windows\System\AvhtOEv.exe2⤵
-
C:\Windows\System\rdIsSNE.exeC:\Windows\System\rdIsSNE.exe2⤵
-
C:\Windows\System\jplsRrM.exeC:\Windows\System\jplsRrM.exe2⤵
-
C:\Windows\System\EnrADBN.exeC:\Windows\System\EnrADBN.exe2⤵
-
C:\Windows\System\FhZqaYo.exeC:\Windows\System\FhZqaYo.exe2⤵
-
C:\Windows\System\JOeXghK.exeC:\Windows\System\JOeXghK.exe2⤵
-
C:\Windows\System\rrrYbHc.exeC:\Windows\System\rrrYbHc.exe2⤵
-
C:\Windows\System\zFETPHP.exeC:\Windows\System\zFETPHP.exe2⤵
-
C:\Windows\System\acPnIUA.exeC:\Windows\System\acPnIUA.exe2⤵
-
C:\Windows\System\GFCObtt.exeC:\Windows\System\GFCObtt.exe2⤵
-
C:\Windows\System\uJNgwsY.exeC:\Windows\System\uJNgwsY.exe2⤵
-
C:\Windows\System\ZndoySv.exeC:\Windows\System\ZndoySv.exe2⤵
-
C:\Windows\System\GZQbWaD.exeC:\Windows\System\GZQbWaD.exe2⤵
-
C:\Windows\System\vRTYHye.exeC:\Windows\System\vRTYHye.exe2⤵
-
C:\Windows\System\UUOMGJU.exeC:\Windows\System\UUOMGJU.exe2⤵
-
C:\Windows\System\OwEAvSP.exeC:\Windows\System\OwEAvSP.exe2⤵
-
C:\Windows\System\qSpCXHV.exeC:\Windows\System\qSpCXHV.exe2⤵
-
C:\Windows\System\AFHSbai.exeC:\Windows\System\AFHSbai.exe2⤵
-
C:\Windows\System\zsiaCXM.exeC:\Windows\System\zsiaCXM.exe2⤵
-
C:\Windows\System\FbpOItr.exeC:\Windows\System\FbpOItr.exe2⤵
-
C:\Windows\System\eHKvbVk.exeC:\Windows\System\eHKvbVk.exe2⤵
-
C:\Windows\System\gugWRSV.exeC:\Windows\System\gugWRSV.exe2⤵
-
C:\Windows\System\XacEiZt.exeC:\Windows\System\XacEiZt.exe2⤵
-
C:\Windows\System\cxlhbxH.exeC:\Windows\System\cxlhbxH.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\BZBBgbw.exeFilesize
1.3MB
MD5c4633a419d193109919d39ff34e0d44e
SHA1142e310afbacadd1929ed6530d20ce5cad3e39de
SHA25666b96e23b9fbf16c60984ba712e129814ad96a18db7591acf6b6cf99c0073a65
SHA5128851695dd045e661ac360f1c571f2ed2393ac14d75cdcb5234667b0660b2541e5a13efa38fda806de973bbd793f1b056c27a2a7db13809d1a75a735059d9d2b5
-
C:\Windows\system\BwWhIIT.exeFilesize
1.3MB
MD5b231bb148431409e82050b65afd43f33
SHA1cbb4395619b0c645118841ceb2048b2d12343299
SHA256ca26ef1e3c95b83cf5dd1cd6460e2eeda293ed4d87cfd3fad7eeca9b283c46c7
SHA512a9e660c8486933992f5b6655be8d3cd3375b8678deace57ef60af12c0d012fa7aa90ff1ad1b5edd5cc5fa62af58411af01995f4ececb31ea3fc7766f8b91a85f
-
C:\Windows\system\EAmsvLB.exeFilesize
1.3MB
MD569b8c21173051a1a4471b26a95854fce
SHA140cdc9dd0dd06cabc5a25b39c5e96aac5940997e
SHA2560a985dfe19272986905b77e62eab331397851a2ce5540a306526614125da973e
SHA512e15963ad776379056b90c34ef7f2b60383703efbe79e2d5bf47adcb175778b4aacacf98f16913604d4f00d6b242b30a7a4a8e3ca8dba0c355298cf0685ddd196
-
C:\Windows\system\GYQwMJb.exeFilesize
1.3MB
MD575d1a6696574b705c723002b0d57c804
SHA1bc49dc8bc580915dd94c37f1392188e4d7bb5c0c
SHA256cc724aa501523eb11353b31b0c6774fe6677923324119c41e036301d2d62a02d
SHA512e79583e0ac7ba22042e9ab5076bb64ee7df7bb5f90c6e3bbf773b4f324297f18095305403b988fe7c17cdb5acd157bf88b5174e124daf45ea920d60ca953bc35
-
C:\Windows\system\HQMtlxe.exeFilesize
1.3MB
MD56af2dae292af0e16d970c7287f1a4b4e
SHA1538c2046979f6b7dbb7a4f8a286b683c296a4795
SHA256c88016431782fa7a361121ab04bcd12532e06510972f8c1d6995a8c9bd053bb5
SHA512b94a90b477ab0d86442fdbea2d5c919525a0177e318ba3f7df988ce045f60d6247b0283cd810c95e783c0e201b125944fc4c247cb78adcb1e954b0e180241ab7
-
C:\Windows\system\KtaTRLC.exeFilesize
1.3MB
MD54a2cc52684af388c99672464f433f8dc
SHA1b23c1fa4169a5b145fe70439a0de40b44670ef92
SHA256c34f0286865c8dba26a7e9fa5265c4083e02bd3a966caf3ca52abd541a511fc6
SHA5122f9b5564633bdcfc9466b5a8646ae6904d3006642671f089da2e5cb0af9a37436176933c286df8a1ed1c9354077ddadc99f37d663188bc2277621260ffbb425f
-
C:\Windows\system\MIDdUjn.exeFilesize
1.3MB
MD57d704b79a5881ce7549157aacede1c91
SHA1a981fae6263dddd945d5b2a8765d89cbec3169dd
SHA2560e897070ddb994704050524d630c19294ff67268966471f11709754f2d638447
SHA512012b205c5804d0cf4e0b6d2cf0f18cc7aa88a388ad712b8aec8a550be72c0f36bf30b208d56a9085e2791533a284104bf899205eb07884be8a8559d120dc3a97
-
C:\Windows\system\NybjAzo.exeFilesize
1.3MB
MD5693328e419fda5f8ec00aacbaa7dd6bc
SHA15f9e1d0243cbe5f687098febc9586c85e86cf829
SHA25693a33cb06c8778f2c3bfd3dbbaebd2c18882969383bc0b241792e942ab362197
SHA5128dc72a36f5008a950e953a4e8d467ab61f1b7cfa2c9a05ba7d43a700bbe8fd41cccb723d3ebf6923c1b3ed96b37877239861f829995a277972f642ee42bde076
-
C:\Windows\system\QUFppFD.exeFilesize
1.3MB
MD576ebe6fef57f5a266049810c1175c943
SHA1865b9c2170a4985247cd645148101fbe3e3af8dc
SHA256fe60d30a5f6d1eae360b8c4ac8c0869a4d55d7be60601a743ec375f404174d9e
SHA512a8e00f6b5b0c1ebb122196572c7c811a157629e6b9fc19f6bed7cc9f0f95550834e805daa9f056d591a6c4f681c7be0a3c31bc8afd1cd8a02268e5ec8bb55855
-
C:\Windows\system\UWZtctp.exeFilesize
1.3MB
MD50bc59e59e39a5ab1587cc69dba79117a
SHA16da086a98ee6d03de2d3ba5e9085f4d5e6575734
SHA25640bd64676be7e24c810ffa05715d5c575d3a991476efe63b66e2224ba4bd185c
SHA5124e165ca629d78550b3f2a63c55742b916f3ba70f1b8af0369dc191f616da75c4b093401c313358db134589c48eb521f14e1e45548655ec9ee06906ad8bbd3454
-
C:\Windows\system\YgEClni.exeFilesize
1.3MB
MD59843cdbcd1a1eba0a1bb5cb29160ab43
SHA1942444d498ee19293fc29a156aaf40bd604754de
SHA256c20bde6bb71f7780b645f2edddbca0fdbdd89cede8901fac3a8ed74f26a66367
SHA512fb9f1df45f2e64f922c30b2dc1703a43c0d786394bad8e81c411737fb04dcf20f0a6da8f6e05e1e564675df64d24f8101b7e8114e0573de1cb657fb4f6b150e3
-
C:\Windows\system\bqdjMyJ.exeFilesize
1.3MB
MD517eb63b8eebb08514c808fcfe7a04935
SHA1b72465a60cf950efd90cf5720a02fb914e7a1dea
SHA25634c361825264db752a7b5fc873f7bf2a646632188177d5176eaac6b6b89c6b56
SHA512263a345d7a7f9e27034e4bf9f999512427f048ee536a1899d3082b5711b0fb158bd24e3c8dc1f1c5ab1eb81a1d29ef28aa0386d99d87bc169981bf596dfb7898
-
C:\Windows\system\eiEwOUx.exeFilesize
1.3MB
MD539dfca80003982749dcff216005ddc92
SHA1255fa18d801a8319a7938555cf7e1c1e4e4c4afe
SHA256d4eb8d6e0dc39875c222dbd11d9c49f08f131773c97b777fd4ad6cd579ea9364
SHA5129c450743a42b2ba8236286f376f755e6bc097aed1235984c946a39b5ba159d6bddc86f9f40779b4b0717a093490a05981a6ca31a09432f6f0c90d6f4ab6f0520
-
C:\Windows\system\goUZsCi.exeFilesize
1.3MB
MD5b4c89c4c5d0658ff77c951dd0ae7df0e
SHA1f42e5b742313d4efd69b548d928856b2a30b20fa
SHA25600f88e32c37b190de8bd13df3620704b2fff89099841e7c481608df0684a0f58
SHA512be2ae455a1419a49cf6eec81ed400985a075aa1da4e5cfcc5d4cf089e42e1e2d64ca538ef6d4a7e6d0be97cd6e59fbd9f78f2db4aab3a94100a4439181dc1425
-
C:\Windows\system\hTUTTeK.exeFilesize
1.3MB
MD5607b5281459e6131f246445daaf9f24a
SHA1cafee7612bf091407027290c5d851f6ab442a83f
SHA256d1a17e2e698653418dd59ab0c25fd52cb708554f22a05aa56435bebe1d6541ce
SHA512f75e33c52bfe23950d3d79864868ed0e1b726df06f4ba2b3ed3f01766a67b67726828b5db844c311a5a5005089b923de5f67778b55f8832d7e24fbdeedf6bec1
-
C:\Windows\system\jBgATWt.exeFilesize
1.3MB
MD5fff36c323ba29057ceb52bfdce8f0ff1
SHA1c167ff6e55aa9aca1264213ad604a857f4ced416
SHA25608e5fe26dff727aaa5ca155179e0ef73f9468a2d6b1bbe8d238c735a2536d844
SHA5122989804be201c8234203dcef85546bd1909c65b5495bcfb9849120666c1326b0e06fa1beae164c1b74d39f06217981a4098fd1e27a8a1be5c531832f936f85d8
-
C:\Windows\system\lAAOQCw.exeFilesize
1.3MB
MD59d02027d0bf7c52efe14f64984556402
SHA12c208bc213d73a804f969e2810a966c37e80a6f5
SHA256bcc74a6e34e08429be3a01894d46bbda9663166668d5f0bf9bba39ec417b4194
SHA512ac1fb4a92c71894ca3173798a5b4df6381822ace1cd71668dc4f9683261fa89bf4622d74e98a2790f5a65170248366e748e64c8b2a5a5bfc8910e8dadea89591
-
C:\Windows\system\mPCHTrR.exeFilesize
1.3MB
MD581c8e2521504015956f851d1d243bd6d
SHA122af9e69cb1d25738d15038a7d19f53f7e151908
SHA25656bf48b3b1b64fbc3daf905c64f30c281f99f50815ba1ca3faf0992c2ca7ddb3
SHA512c9bff53e19382e089053c0773b6f9a53adce53e3b85f1db1f4be3a3ae94ffc48b1ace0b8c6349d83f54acb960da77258b301b826318dace85bb2c41bd2e09639
-
C:\Windows\system\nHMyxpk.exeFilesize
1.3MB
MD50b102f8cd679786223a7cef577e8f85b
SHA1e8568bf7068f2e750927b83fe45668733c40e3cd
SHA2565b727e6843c59819ed3227166e430e0022dfa204961879c87b0d766807ad1504
SHA51281767dd7bfbb99c6b2c1b52f83b60e3525ca242bae1fc42315d3c123336f29f990bcd8a7d37760bec53e73019f5cb056bc78ca184a06fb3ec3fbb995596ea214
-
C:\Windows\system\nTWEFHQ.exeFilesize
1.3MB
MD593853a9bbd645419225fb244e707ea4d
SHA185b09439c575fc9d9b58886ed5a906a5ad171a42
SHA2563d11a7879973505931386601a3a8544915cf74d1e007a832e6b4c6d1897da721
SHA512a7a6fefecd3a468aca5a717c6b1b618306a10a37cec318057f2de5d061b7d5c3919cb635e26701e794dc2b01e75399a2f2b4f54e45aac4de49125e7ba44acb6b
-
C:\Windows\system\neyokwS.exeFilesize
1.3MB
MD5e46d89c5bcd0798857fea8c535c748d4
SHA13be214d8ae0b557e5bd721d9eea8fb54b079c33f
SHA2561560674393b7b115a4053e1863e79bbdd0e5f709fd1f20b48c1dda4dfa92391a
SHA512521c0192d6fcf3cd946ccad3a3a5fd870d636e166c3349248460035372af8a9a5f807d5c39b45d5b4a7a91f8c21064b45bb14230c8d0bbd14ed2b260a2e8c73b
-
C:\Windows\system\oStDytC.exeFilesize
1.3MB
MD5ebde26a3ccb50b2eeb05b6fc102f0b53
SHA193e421e80cca7658d0b8d399267df02fa43b9010
SHA2567d95304c038760e6e35bf84d47a34aa0288d27137d963d039ea0edc937b88e37
SHA51221449456a6905f3a79d68503b2728f50d44fc325c8e109df368a6195f0533409aa82b837fc96a8951c32b60b5acb151008a6b9e57719a46c43f61230842f18d3
-
C:\Windows\system\pVFhqfg.exeFilesize
1.3MB
MD577ade7c4d41319be7ceb163934eb6888
SHA1312212ecc647f1cf005bda70e21b5589e4fa2989
SHA25618806cbe0141701948a5ff798d202ed26cea7c524978aca96f2d73859db8559e
SHA51250d811e728ca310738e816cad7fa7c4f2a8f2eb874e75b9753930dd66074719af4cabcb5c80a899f7fa8fc4d10ee6fab40adf8b4cb91a20fb4fd2daef7ff058d
-
C:\Windows\system\qOuvOxf.exeFilesize
1.3MB
MD5bf41cbf0e66103649e4b0026c4c3179e
SHA1b48bbaa6b75531d9354feebc9fa7af42c7d3e257
SHA256c6924399b15f352511c7b2abda04bb538c4e0af3bba2bb7e2defef195ef752d5
SHA5126182e01f49b96191859ca4ce7d7545db29edcfbfd56db64de718fc4c9b49e1f7cb22ce61da0adf01cb47d37e182e60db8623d0313f306bfe863c4f8f12d278c7
-
C:\Windows\system\rSOtHvv.exeFilesize
1.3MB
MD58a20d6c1aeee55ec8d063249a57891d4
SHA1707e46db0f1a296b0c788b789c6bcc95b1197ea7
SHA256539941cf35bc393733e26be82b1e188396c1f1121d0f74193a6c41e1e65f738b
SHA512681f040d5a9eb1bffc1235ab135ee9062d1ad588390e2e0e734a00aa72fd3294e6f586fefbada5a476fccbf9d00fe015683c99be0450dd992a8e745761929202
-
C:\Windows\system\sMoDJsA.exeFilesize
1.3MB
MD573aca0f54866925a78f688bfb0d21c66
SHA17cc23e219fd27b224e55055e9567c5de467200f6
SHA25674290bc07c565724580dfe1e15bfc0d5d44b3e01323e26d1813c425ee2ba2bb4
SHA5129cc609bbe58954e5b90cd10e3f9532da8dc19d3d84d435f04756c5746321e2ca41ecaf3c667de020977febf4f8fef783071af38bccc9200f274a69a90b2dbbf4
-
C:\Windows\system\txAepgq.exeFilesize
1.3MB
MD5a9315b2ee6a1095ba9e9e44820de51df
SHA11e6e141138ce39341d695a966e397f9a7e747b48
SHA256972437aaf1e06816161b91c5f14f123550a79e51e0b9c89ecb469ea74be98ae8
SHA5124057af77ad474798b70e4e8ae90fdd227cc804e0c7430c137ba6f7ec2c92be9f3bc6798be9d468b719f9485d676e942588a4deb45eb2f06a71a8f47998b2400a
-
C:\Windows\system\yzoRdfA.exeFilesize
1.3MB
MD5ee5915f8ba6ed3bb097979871cd1744e
SHA1733e8b3997e63e22d957e66c93fd29ebcb7aec6b
SHA2564b8e5fb044cf36c1808e45c5632bbeb4ee35e2482859d8c4dc6b762bf8ca02e4
SHA512e0e76da3c3e7611deb0a06a9ff6eeb20b48030873ee88efbffb0545a35dc91f64624b9455ded04d68f251ddb583b9d2cef3027d7e6245adc02036464e03d057e
-
\Windows\system\QFWnHjq.exeFilesize
1.3MB
MD509840d822d26b97f3b981f73c105350f
SHA16400c1daf522cbe13357eb9248548a97bee24015
SHA256eae15a03e1e46015e4c517a4f7b228e79b97721ba39bfd2f62b82757dac3c353
SHA512e5df7a73615ff90c0e353b07f72bc8718f311b9f5ce308fe04beb1bf277e1787de571881ee17ea02e93f7be4a81563cdb2b62de5e58b140369896e355cd4ef6c
-
\Windows\system\VeAlrMm.exeFilesize
1.3MB
MD52eb39b4e22db3d645ea86295ba25ffb0
SHA15d8d77302d010826042b6260fe63e4d3556cceb5
SHA2562f7787601d2fe273f2478dd14e397c8041493eb8cbb6a5811595bfe5e8639a01
SHA51244f1cdf1534aa42b5dcd6f86fbf8c04b491706360af4bf62ec5db02b9e1ed7002a3aa78a3c26e56f7f07e58a5a7aa76ef7b449ce7e11a3b4987243e36bbe4bf1
-
\Windows\system\eiRdHUs.exeFilesize
1.3MB
MD55345a6a3913bc7b06245bb4be5796b8c
SHA1c51089b90bce1d8595c6c74145e4c4bcf1a5efe7
SHA256491f37b5d856b8ee51054a5b95a3ed33292cd7946618cf3b5d75236a7d89a6f8
SHA51213e08893b169293980474e4d844949039608e3664e786c4e5d40066b793d9fd8c6345f3ded373114f9ea7f472a05e234b680dca51b1300def9bb977118d28597
-
\Windows\system\lPmXQSx.exeFilesize
1.3MB
MD58c0d957b7333abcd6aa742b10bafa521
SHA1ee9e1c8a1566c8d8238ad059eaadfe7bf0f28a26
SHA256f0ca75443d657b7837cb5a59f95bcfa792650bd23c06097dfc586ca1ea6388d1
SHA51289350c7d0de99fac8769c7a2783ea4613e13fbead69e701042797831b391bf323f0dc82b6d5447ad3a24fab49136440f91d7187ead96844a3482d8814f887b50
-
memory/2868-0-0x00000000003F0000-0x0000000000400000-memory.dmpFilesize
64KB