Analysis
-
max time kernel
147s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
327641769a04d17eac647f8f044a3920_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
327641769a04d17eac647f8f044a3920_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
327641769a04d17eac647f8f044a3920_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
327641769a04d17eac647f8f044a3920
-
SHA1
19fb0c54035225a0f449d7a7b12d2e872484e68b
-
SHA256
3737dcf7173ed70433c62cf7c5e2d5648935307de0544477d264b2b75f45ea49
-
SHA512
d42e2c5363e0a8a4257802e8b7a4b5ed82ce0f7db20f1762df15007f199454bcb84aed905686e2b3c0e98e7064726cab2fc3111c90074d62854fe4b78458158b
-
SSDEEP
24576:1qylFH50Dv6RwyeQvt6ot0h9HyrOgiruAiR:IylFHUv6ReIt0jSrOm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation A9B50.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation U1U6B.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation R08TE.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation FCZ97.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 29B7A.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 6QV2C.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Z714A.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation AV2AD.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation DK7HF.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 4JUD9.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation F61I2.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 8HXTZ.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation GX820.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation P1V24.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 8144V.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 0705G.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 6RC9T.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation R2G32.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 06Z9Q.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation YN6FX.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 770DM.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation GK7T2.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation R5B54.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation A1IM5.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation D03A9.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation JZZ66.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Y9ETA.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation ZBPZU.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation O2Q45.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 8H3OB.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 7BJ74.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation R80JM.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation O26L6.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation R84JW.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 2W54J.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation I26EG.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 8U211.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation HDQR0.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation R5NDI.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 0C77M.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 4UQ6B.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 27GQC.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 81307.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 1D1X9.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 9D795.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation RMR29.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Y24S4.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 64X0U.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation G09X1.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 2V692.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation A4022.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 6V5YR.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 9B73G.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation BN461.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 52SLL.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 94J2W.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation IYV8W.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation W9OQ9.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation PKZ29.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 27O7T.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 32D0K.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation C271P.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation X410F.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation G9358.exe -
Executes dropped EXE 64 IoCs
pid Process 3000 JESG6.exe 3936 ZG9GW.exe 1912 7I35S.exe 1668 O2Q45.exe 3712 2B573.exe 3440 O1293.exe 4184 641LU.exe 3852 K082M.exe 3716 3OY30.exe 4388 M8465.exe 4408 RMR29.exe 64 89QT3.exe 4144 R27V4.exe 4904 YN6FX.exe 100 0C77M.exe 1508 B46A6.exe 2960 D83E2.exe 216 7KC0Y.exe 2300 942B8.exe 1904 1J7JR.exe 1884 Z7E89.exe 968 0Q8EX.exe 3316 D9GCC.exe 4000 U62MR.exe 3876 7BFWG.exe 4672 CDQ5H.exe 4852 188I7.exe 3908 J6291.exe 3576 0I7HD.exe 4092 8E54T.exe 1252 2E5GM.exe 4892 O41BH.exe 5032 R905X.exe 2620 7H4L3.exe 4404 2B8EU.exe 4888 XW42A.exe 3332 Y24S4.exe 1704 51K9V.exe 4408 1387K.exe 2568 Y8O76.exe 3304 ZX67A.exe 4700 AV2AD.exe 1384 4286J.exe 5100 NX9L5.exe 1460 F4MZM.exe 3632 6RA87.exe 1972 35WR9.exe 3132 9L664.exe 916 487E9.exe 4436 R84JW.exe 3572 G0OO2.exe 3416 O79GQ.exe 2316 27O7T.exe 444 305Q3.exe 804 246T5.exe 64 2W54J.exe 4304 770DM.exe 1876 4UN76.exe 2636 LF2QU.exe 3248 58409.exe 4920 E9H77.exe 772 IO3S5.exe 1012 3QC8J.exe 216 Q6V42.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1372 327641769a04d17eac647f8f044a3920_NeikiAnalytics.exe 1372 327641769a04d17eac647f8f044a3920_NeikiAnalytics.exe 3000 JESG6.exe 3000 JESG6.exe 3936 ZG9GW.exe 3936 ZG9GW.exe 1912 7I35S.exe 1912 7I35S.exe 1668 O2Q45.exe 1668 O2Q45.exe 3712 2B573.exe 3712 2B573.exe 3440 O1293.exe 3440 O1293.exe 4184 641LU.exe 4184 641LU.exe 3852 K082M.exe 3852 K082M.exe 3716 3OY30.exe 3716 3OY30.exe 4388 M8465.exe 4388 M8465.exe 4408 RMR29.exe 4408 RMR29.exe 64 89QT3.exe 64 89QT3.exe 4144 R27V4.exe 4144 R27V4.exe 4904 YN6FX.exe 4904 YN6FX.exe 100 0C77M.exe 100 0C77M.exe 1508 B46A6.exe 1508 B46A6.exe 2960 D83E2.exe 2960 D83E2.exe 216 7KC0Y.exe 216 7KC0Y.exe 2300 942B8.exe 2300 942B8.exe 1904 1J7JR.exe 1904 1J7JR.exe 1884 Z7E89.exe 1884 Z7E89.exe 968 0Q8EX.exe 968 0Q8EX.exe 3316 D9GCC.exe 3316 D9GCC.exe 4000 U62MR.exe 4000 U62MR.exe 3876 7BFWG.exe 3876 7BFWG.exe 4672 CDQ5H.exe 4672 CDQ5H.exe 4852 188I7.exe 4852 188I7.exe 3908 J6291.exe 3908 J6291.exe 3576 0I7HD.exe 3576 0I7HD.exe 4092 8E54T.exe 4092 8E54T.exe 1252 2E5GM.exe 1252 2E5GM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1372 wrote to memory of 3000 1372 327641769a04d17eac647f8f044a3920_NeikiAnalytics.exe 83 PID 1372 wrote to memory of 3000 1372 327641769a04d17eac647f8f044a3920_NeikiAnalytics.exe 83 PID 1372 wrote to memory of 3000 1372 327641769a04d17eac647f8f044a3920_NeikiAnalytics.exe 83 PID 3000 wrote to memory of 3936 3000 JESG6.exe 84 PID 3000 wrote to memory of 3936 3000 JESG6.exe 84 PID 3000 wrote to memory of 3936 3000 JESG6.exe 84 PID 3936 wrote to memory of 1912 3936 ZG9GW.exe 86 PID 3936 wrote to memory of 1912 3936 ZG9GW.exe 86 PID 3936 wrote to memory of 1912 3936 ZG9GW.exe 86 PID 1912 wrote to memory of 1668 1912 7I35S.exe 88 PID 1912 wrote to memory of 1668 1912 7I35S.exe 88 PID 1912 wrote to memory of 1668 1912 7I35S.exe 88 PID 1668 wrote to memory of 3712 1668 O2Q45.exe 90 PID 1668 wrote to memory of 3712 1668 O2Q45.exe 90 PID 1668 wrote to memory of 3712 1668 O2Q45.exe 90 PID 3712 wrote to memory of 3440 3712 2B573.exe 91 PID 3712 wrote to memory of 3440 3712 2B573.exe 91 PID 3712 wrote to memory of 3440 3712 2B573.exe 91 PID 3440 wrote to memory of 4184 3440 O1293.exe 92 PID 3440 wrote to memory of 4184 3440 O1293.exe 92 PID 3440 wrote to memory of 4184 3440 O1293.exe 92 PID 4184 wrote to memory of 3852 4184 641LU.exe 95 PID 4184 wrote to memory of 3852 4184 641LU.exe 95 PID 4184 wrote to memory of 3852 4184 641LU.exe 95 PID 3852 wrote to memory of 3716 3852 K082M.exe 96 PID 3852 wrote to memory of 3716 3852 K082M.exe 96 PID 3852 wrote to memory of 3716 3852 K082M.exe 96 PID 3716 wrote to memory of 4388 3716 3OY30.exe 97 PID 3716 wrote to memory of 4388 3716 3OY30.exe 97 PID 3716 wrote to memory of 4388 3716 3OY30.exe 97 PID 4388 wrote to memory of 4408 4388 M8465.exe 99 PID 4388 wrote to memory of 4408 4388 M8465.exe 99 PID 4388 wrote to memory of 4408 4388 M8465.exe 99 PID 4408 wrote to memory of 64 4408 RMR29.exe 101 PID 4408 wrote to memory of 64 4408 RMR29.exe 101 PID 4408 wrote to memory of 64 4408 RMR29.exe 101 PID 64 wrote to memory of 4144 64 89QT3.exe 102 PID 64 wrote to memory of 4144 64 89QT3.exe 102 PID 64 wrote to memory of 4144 64 89QT3.exe 102 PID 4144 wrote to memory of 4904 4144 R27V4.exe 103 PID 4144 wrote to memory of 4904 4144 R27V4.exe 103 PID 4144 wrote to memory of 4904 4144 R27V4.exe 103 PID 4904 wrote to memory of 100 4904 YN6FX.exe 104 PID 4904 wrote to memory of 100 4904 YN6FX.exe 104 PID 4904 wrote to memory of 100 4904 YN6FX.exe 104 PID 100 wrote to memory of 1508 100 0C77M.exe 105 PID 100 wrote to memory of 1508 100 0C77M.exe 105 PID 100 wrote to memory of 1508 100 0C77M.exe 105 PID 1508 wrote to memory of 2960 1508 B46A6.exe 106 PID 1508 wrote to memory of 2960 1508 B46A6.exe 106 PID 1508 wrote to memory of 2960 1508 B46A6.exe 106 PID 2960 wrote to memory of 216 2960 D83E2.exe 107 PID 2960 wrote to memory of 216 2960 D83E2.exe 107 PID 2960 wrote to memory of 216 2960 D83E2.exe 107 PID 216 wrote to memory of 2300 216 7KC0Y.exe 108 PID 216 wrote to memory of 2300 216 7KC0Y.exe 108 PID 216 wrote to memory of 2300 216 7KC0Y.exe 108 PID 2300 wrote to memory of 1904 2300 942B8.exe 110 PID 2300 wrote to memory of 1904 2300 942B8.exe 110 PID 2300 wrote to memory of 1904 2300 942B8.exe 110 PID 1904 wrote to memory of 1884 1904 1J7JR.exe 111 PID 1904 wrote to memory of 1884 1904 1J7JR.exe 111 PID 1904 wrote to memory of 1884 1904 1J7JR.exe 111 PID 1884 wrote to memory of 968 1884 Z7E89.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\327641769a04d17eac647f8f044a3920_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\327641769a04d17eac647f8f044a3920_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\JESG6.exe"C:\Users\Admin\AppData\Local\Temp\JESG6.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\ZG9GW.exe"C:\Users\Admin\AppData\Local\Temp\ZG9GW.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\7I35S.exe"C:\Users\Admin\AppData\Local\Temp\7I35S.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\O2Q45.exe"C:\Users\Admin\AppData\Local\Temp\O2Q45.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\2B573.exe"C:\Users\Admin\AppData\Local\Temp\2B573.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\O1293.exe"C:\Users\Admin\AppData\Local\Temp\O1293.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\641LU.exe"C:\Users\Admin\AppData\Local\Temp\641LU.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\K082M.exe"C:\Users\Admin\AppData\Local\Temp\K082M.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\3OY30.exe"C:\Users\Admin\AppData\Local\Temp\3OY30.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\M8465.exe"C:\Users\Admin\AppData\Local\Temp\M8465.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\RMR29.exe"C:\Users\Admin\AppData\Local\Temp\RMR29.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\89QT3.exe"C:\Users\Admin\AppData\Local\Temp\89QT3.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\R27V4.exe"C:\Users\Admin\AppData\Local\Temp\R27V4.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\YN6FX.exe"C:\Users\Admin\AppData\Local\Temp\YN6FX.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\0C77M.exe"C:\Users\Admin\AppData\Local\Temp\0C77M.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\B46A6.exe"C:\Users\Admin\AppData\Local\Temp\B46A6.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\D83E2.exe"C:\Users\Admin\AppData\Local\Temp\D83E2.exe"18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\7KC0Y.exe"C:\Users\Admin\AppData\Local\Temp\7KC0Y.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\942B8.exe"C:\Users\Admin\AppData\Local\Temp\942B8.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\1J7JR.exe"C:\Users\Admin\AppData\Local\Temp\1J7JR.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Z7E89.exe"C:\Users\Admin\AppData\Local\Temp\Z7E89.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\0Q8EX.exe"C:\Users\Admin\AppData\Local\Temp\0Q8EX.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:968 -
C:\Users\Admin\AppData\Local\Temp\D9GCC.exe"C:\Users\Admin\AppData\Local\Temp\D9GCC.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\U62MR.exe"C:\Users\Admin\AppData\Local\Temp\U62MR.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\7BFWG.exe"C:\Users\Admin\AppData\Local\Temp\7BFWG.exe"26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\CDQ5H.exe"C:\Users\Admin\AppData\Local\Temp\CDQ5H.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\188I7.exe"C:\Users\Admin\AppData\Local\Temp\188I7.exe"28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\J6291.exe"C:\Users\Admin\AppData\Local\Temp\J6291.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\0I7HD.exe"C:\Users\Admin\AppData\Local\Temp\0I7HD.exe"30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\8E54T.exe"C:\Users\Admin\AppData\Local\Temp\8E54T.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\2E5GM.exe"C:\Users\Admin\AppData\Local\Temp\2E5GM.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\O41BH.exe"C:\Users\Admin\AppData\Local\Temp\O41BH.exe"33⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\R905X.exe"C:\Users\Admin\AppData\Local\Temp\R905X.exe"34⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\7H4L3.exe"C:\Users\Admin\AppData\Local\Temp\7H4L3.exe"35⤵
- Executes dropped EXE
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\2B8EU.exe"C:\Users\Admin\AppData\Local\Temp\2B8EU.exe"36⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\XW42A.exe"C:\Users\Admin\AppData\Local\Temp\XW42A.exe"37⤵
- Executes dropped EXE
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\Y24S4.exe"C:\Users\Admin\AppData\Local\Temp\Y24S4.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\51K9V.exe"C:\Users\Admin\AppData\Local\Temp\51K9V.exe"39⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\1387K.exe"C:\Users\Admin\AppData\Local\Temp\1387K.exe"40⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\Y8O76.exe"C:\Users\Admin\AppData\Local\Temp\Y8O76.exe"41⤵
- Executes dropped EXE
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\ZX67A.exe"C:\Users\Admin\AppData\Local\Temp\ZX67A.exe"42⤵
- Executes dropped EXE
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\AV2AD.exe"C:\Users\Admin\AppData\Local\Temp\AV2AD.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\4286J.exe"C:\Users\Admin\AppData\Local\Temp\4286J.exe"44⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\NX9L5.exe"C:\Users\Admin\AppData\Local\Temp\NX9L5.exe"45⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\F4MZM.exe"C:\Users\Admin\AppData\Local\Temp\F4MZM.exe"46⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\6RA87.exe"C:\Users\Admin\AppData\Local\Temp\6RA87.exe"47⤵
- Executes dropped EXE
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\35WR9.exe"C:\Users\Admin\AppData\Local\Temp\35WR9.exe"48⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\9L664.exe"C:\Users\Admin\AppData\Local\Temp\9L664.exe"49⤵
- Executes dropped EXE
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\487E9.exe"C:\Users\Admin\AppData\Local\Temp\487E9.exe"50⤵
- Executes dropped EXE
PID:916 -
C:\Users\Admin\AppData\Local\Temp\R84JW.exe"C:\Users\Admin\AppData\Local\Temp\R84JW.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\G0OO2.exe"C:\Users\Admin\AppData\Local\Temp\G0OO2.exe"52⤵
- Executes dropped EXE
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\O79GQ.exe"C:\Users\Admin\AppData\Local\Temp\O79GQ.exe"53⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\27O7T.exe"C:\Users\Admin\AppData\Local\Temp\27O7T.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\305Q3.exe"C:\Users\Admin\AppData\Local\Temp\305Q3.exe"55⤵
- Executes dropped EXE
PID:444 -
C:\Users\Admin\AppData\Local\Temp\246T5.exe"C:\Users\Admin\AppData\Local\Temp\246T5.exe"56⤵
- Executes dropped EXE
PID:804 -
C:\Users\Admin\AppData\Local\Temp\2W54J.exe"C:\Users\Admin\AppData\Local\Temp\2W54J.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:64 -
C:\Users\Admin\AppData\Local\Temp\770DM.exe"C:\Users\Admin\AppData\Local\Temp\770DM.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\4UN76.exe"C:\Users\Admin\AppData\Local\Temp\4UN76.exe"59⤵
- Executes dropped EXE
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\LF2QU.exe"C:\Users\Admin\AppData\Local\Temp\LF2QU.exe"60⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\58409.exe"C:\Users\Admin\AppData\Local\Temp\58409.exe"61⤵
- Executes dropped EXE
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\E9H77.exe"C:\Users\Admin\AppData\Local\Temp\E9H77.exe"62⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\IO3S5.exe"C:\Users\Admin\AppData\Local\Temp\IO3S5.exe"63⤵
- Executes dropped EXE
PID:772 -
C:\Users\Admin\AppData\Local\Temp\3QC8J.exe"C:\Users\Admin\AppData\Local\Temp\3QC8J.exe"64⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\Q6V42.exe"C:\Users\Admin\AppData\Local\Temp\Q6V42.exe"65⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\9C34U.exe"C:\Users\Admin\AppData\Local\Temp\9C34U.exe"66⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\BN461.exe"C:\Users\Admin\AppData\Local\Temp\BN461.exe"67⤵
- Checks computer location settings
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\FCZ97.exe"C:\Users\Admin\AppData\Local\Temp\FCZ97.exe"68⤵
- Checks computer location settings
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\NZ5C1.exe"C:\Users\Admin\AppData\Local\Temp\NZ5C1.exe"69⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\29B7A.exe"C:\Users\Admin\AppData\Local\Temp\29B7A.exe"70⤵
- Checks computer location settings
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\E5Y59.exe"C:\Users\Admin\AppData\Local\Temp\E5Y59.exe"71⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\V65W3.exe"C:\Users\Admin\AppData\Local\Temp\V65W3.exe"72⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\397ZW.exe"C:\Users\Admin\AppData\Local\Temp\397ZW.exe"73⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\D03A9.exe"C:\Users\Admin\AppData\Local\Temp\D03A9.exe"74⤵
- Checks computer location settings
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\HBV1S.exe"C:\Users\Admin\AppData\Local\Temp\HBV1S.exe"75⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\346B2.exe"C:\Users\Admin\AppData\Local\Temp\346B2.exe"76⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\SQ238.exe"C:\Users\Admin\AppData\Local\Temp\SQ238.exe"77⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\SO7E0.exe"C:\Users\Admin\AppData\Local\Temp\SO7E0.exe"78⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\4Z73Z.exe"C:\Users\Admin\AppData\Local\Temp\4Z73Z.exe"79⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\15010.exe"C:\Users\Admin\AppData\Local\Temp\15010.exe"80⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\3W102.exe"C:\Users\Admin\AppData\Local\Temp\3W102.exe"81⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\DDR64.exe"C:\Users\Admin\AppData\Local\Temp\DDR64.exe"82⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\C89P7.exe"C:\Users\Admin\AppData\Local\Temp\C89P7.exe"83⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\B30PC.exe"C:\Users\Admin\AppData\Local\Temp\B30PC.exe"84⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\8H3OB.exe"C:\Users\Admin\AppData\Local\Temp\8H3OB.exe"85⤵
- Checks computer location settings
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\55767.exe"C:\Users\Admin\AppData\Local\Temp\55767.exe"86⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\0U5J1.exe"C:\Users\Admin\AppData\Local\Temp\0U5J1.exe"87⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\RV8L4.exe"C:\Users\Admin\AppData\Local\Temp\RV8L4.exe"88⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\LO737.exe"C:\Users\Admin\AppData\Local\Temp\LO737.exe"89⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\7X1ID.exe"C:\Users\Admin\AppData\Local\Temp\7X1ID.exe"90⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\1434U.exe"C:\Users\Admin\AppData\Local\Temp\1434U.exe"91⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\52SLL.exe"C:\Users\Admin\AppData\Local\Temp\52SLL.exe"92⤵
- Checks computer location settings
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\V754D.exe"C:\Users\Admin\AppData\Local\Temp\V754D.exe"93⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\3FYMV.exe"C:\Users\Admin\AppData\Local\Temp\3FYMV.exe"94⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\6O157.exe"C:\Users\Admin\AppData\Local\Temp\6O157.exe"95⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\N3FGR.exe"C:\Users\Admin\AppData\Local\Temp\N3FGR.exe"96⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\2IP99.exe"C:\Users\Admin\AppData\Local\Temp\2IP99.exe"97⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\8HXTZ.exe"C:\Users\Admin\AppData\Local\Temp\8HXTZ.exe"98⤵
- Checks computer location settings
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\0UT53.exe"C:\Users\Admin\AppData\Local\Temp\0UT53.exe"99⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\XM3RJ.exe"C:\Users\Admin\AppData\Local\Temp\XM3RJ.exe"100⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\51M56.exe"C:\Users\Admin\AppData\Local\Temp\51M56.exe"101⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\H6CMY.exe"C:\Users\Admin\AppData\Local\Temp\H6CMY.exe"102⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\4UQ6B.exe"C:\Users\Admin\AppData\Local\Temp\4UQ6B.exe"103⤵
- Checks computer location settings
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\49LW4.exe"C:\Users\Admin\AppData\Local\Temp\49LW4.exe"104⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\W7W7X.exe"C:\Users\Admin\AppData\Local\Temp\W7W7X.exe"105⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\S14QC.exe"C:\Users\Admin\AppData\Local\Temp\S14QC.exe"106⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\65YE6.exe"C:\Users\Admin\AppData\Local\Temp\65YE6.exe"107⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\94J2W.exe"C:\Users\Admin\AppData\Local\Temp\94J2W.exe"108⤵
- Checks computer location settings
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\1QQQ9.exe"C:\Users\Admin\AppData\Local\Temp\1QQQ9.exe"109⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\CY9XJ.exe"C:\Users\Admin\AppData\Local\Temp\CY9XJ.exe"110⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\7BJ74.exe"C:\Users\Admin\AppData\Local\Temp\7BJ74.exe"111⤵
- Checks computer location settings
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\EI49P.exe"C:\Users\Admin\AppData\Local\Temp\EI49P.exe"112⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\L6VK2.exe"C:\Users\Admin\AppData\Local\Temp\L6VK2.exe"113⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\27GQC.exe"C:\Users\Admin\AppData\Local\Temp\27GQC.exe"114⤵
- Checks computer location settings
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\5HN66.exe"C:\Users\Admin\AppData\Local\Temp\5HN66.exe"115⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\6KYDK.exe"C:\Users\Admin\AppData\Local\Temp\6KYDK.exe"116⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\K2U7F.exe"C:\Users\Admin\AppData\Local\Temp\K2U7F.exe"117⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\36X89.exe"C:\Users\Admin\AppData\Local\Temp\36X89.exe"118⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\981FR.exe"C:\Users\Admin\AppData\Local\Temp\981FR.exe"119⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\AW6E8.exe"C:\Users\Admin\AppData\Local\Temp\AW6E8.exe"120⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\EL6JT.exe"C:\Users\Admin\AppData\Local\Temp\EL6JT.exe"121⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\98405.exe"C:\Users\Admin\AppData\Local\Temp\98405.exe"122⤵PID:1520
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-