Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 22:22
Behavioral task
behavioral1
Sample
8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe
-
Size
1.0MB
-
MD5
8bc422c14a97d0f8ab8d3845e08f3720
-
SHA1
21b288afc566eb39b92eeb3a99b4ede431a59766
-
SHA256
c1501d5dafc05acbeedab052ed9e62bd8f9e8bfdbe5e3fe18df3310a79d03b2d
-
SHA512
764c0b4161afdef294b5c09e840e6a6d9c82e2183f870af6faeac2add1109de212f4977de4c1210ec69b69810eed348917bdcd7b8bb27e4406c9ee69de969e7e
-
SSDEEP
24576:GezaTnG99Q8FcNrpyNdfE0bLBgDOp2iSLz9LbBwlKensPLI6va:GezaTF8FcNkNdfE0pZ9oztFwIhLI6y
Malware Config
Signatures
-
XMRig Miner payload 33 IoCs
Processes:
resource yara_rule C:\Windows\System\lFIJGmJ.exe xmrig C:\Windows\System\AdFqSqI.exe xmrig C:\Windows\System\GfWUYtY.exe xmrig C:\Windows\System\OtUDSZX.exe xmrig C:\Windows\System\gZYkhkE.exe xmrig C:\Windows\System\fmNHENs.exe xmrig C:\Windows\System\trOGgqU.exe xmrig C:\Windows\System\QehaBJK.exe xmrig C:\Windows\System\edOOEil.exe xmrig C:\Windows\System\jElCMDQ.exe xmrig C:\Windows\System\uUaqaLZ.exe xmrig C:\Windows\System\ZKncBpJ.exe xmrig C:\Windows\System\YYozxhy.exe xmrig C:\Windows\System\zLeyWgE.exe xmrig C:\Windows\System\oPwQSIs.exe xmrig C:\Windows\System\hYeqxbP.exe xmrig C:\Windows\System\tekcxCP.exe xmrig C:\Windows\System\YQILsgQ.exe xmrig C:\Windows\System\nUzKnQH.exe xmrig C:\Windows\System\UslVPWt.exe xmrig C:\Windows\System\HoSgUMG.exe xmrig C:\Windows\System\AirhRBE.exe xmrig C:\Windows\System\lpSxuau.exe xmrig C:\Windows\System\bHlmfWU.exe xmrig C:\Windows\System\bCcgZUE.exe xmrig C:\Windows\System\bAKioUo.exe xmrig C:\Windows\System\izxeDlO.exe xmrig C:\Windows\System\XaOQvlJ.exe xmrig C:\Windows\System\EppKHxS.exe xmrig C:\Windows\System\bIDJHwF.exe xmrig C:\Windows\System\nCkXflL.exe xmrig C:\Windows\System\QhhYeCK.exe xmrig C:\Windows\System\kbqXHXL.exe xmrig -
Executes dropped EXE 64 IoCs
Processes:
trOGgqU.exefmNHENs.exegZYkhkE.exeOtUDSZX.exelFIJGmJ.exeGfWUYtY.exeAdFqSqI.exeQehaBJK.exeedOOEil.exejElCMDQ.exeuUaqaLZ.exeZKncBpJ.exeYYozxhy.exezLeyWgE.exenUzKnQH.exeoPwQSIs.exehYeqxbP.exetekcxCP.exeYQILsgQ.exekbqXHXL.exeUslVPWt.exeQhhYeCK.exenCkXflL.exebIDJHwF.exeEppKHxS.exeXaOQvlJ.exeizxeDlO.exebAKioUo.exeHoSgUMG.exebCcgZUE.exelpSxuau.exebHlmfWU.exeAirhRBE.exeDDsKIWe.exeGGOZTgI.exeolwmXRs.exeuBNkOZg.exeVcnJrWQ.exetAbsqFM.exeAeWAyIw.exeHSftZjb.exejMbPYKB.exeEUZlwTT.exeqRMGjoI.exetVzuWOb.exeedBSXMA.exeobDSVFP.exeBgjwIzs.exeaGTHLoM.exeTiJrHkw.exeYgBZVap.exelXixIOs.exeTVFzDGJ.exedZtKXpD.exesdfoTbK.exeRaqCBEG.exegoupqfT.exeCfOIfYD.exeLoqHwFB.exeWwrwkQx.exeFPjWQau.exeKrJOauY.exeIPlzqxj.exewVLqVdN.exepid process 4684 trOGgqU.exe 3948 fmNHENs.exe 3184 gZYkhkE.exe 3664 OtUDSZX.exe 1052 lFIJGmJ.exe 2144 GfWUYtY.exe 1632 AdFqSqI.exe 3964 QehaBJK.exe 1924 edOOEil.exe 4484 jElCMDQ.exe 3424 uUaqaLZ.exe 1648 ZKncBpJ.exe 2148 YYozxhy.exe 4516 zLeyWgE.exe 1008 nUzKnQH.exe 4608 oPwQSIs.exe 4612 hYeqxbP.exe 3536 tekcxCP.exe 220 YQILsgQ.exe 2072 kbqXHXL.exe 5044 UslVPWt.exe 1640 QhhYeCK.exe 4476 nCkXflL.exe 4072 bIDJHwF.exe 3220 EppKHxS.exe 4984 XaOQvlJ.exe 4720 izxeDlO.exe 1200 bAKioUo.exe 2676 HoSgUMG.exe 3304 bCcgZUE.exe 2648 lpSxuau.exe 3672 bHlmfWU.exe 5076 AirhRBE.exe 4936 DDsKIWe.exe 4040 GGOZTgI.exe 4688 olwmXRs.exe 4144 uBNkOZg.exe 2176 VcnJrWQ.exe 468 tAbsqFM.exe 4492 AeWAyIw.exe 4024 HSftZjb.exe 4124 jMbPYKB.exe 2592 EUZlwTT.exe 1644 qRMGjoI.exe 4932 tVzuWOb.exe 2552 edBSXMA.exe 4888 obDSVFP.exe 3676 BgjwIzs.exe 1016 aGTHLoM.exe 4420 TiJrHkw.exe 3644 YgBZVap.exe 3436 lXixIOs.exe 2800 TVFzDGJ.exe 5072 dZtKXpD.exe 2844 sdfoTbK.exe 3864 RaqCBEG.exe 1612 goupqfT.exe 1908 CfOIfYD.exe 652 LoqHwFB.exe 2400 WwrwkQx.exe 2744 FPjWQau.exe 4928 KrJOauY.exe 3160 IPlzqxj.exe 4764 wVLqVdN.exe -
Drops file in Windows directory 64 IoCs
Processes:
8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exedescription ioc process File created C:\Windows\System\tekcxCP.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\NzuTOau.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\qyADOie.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\edOOEil.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\vKRWnKK.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\RbIEuzy.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\OlFFHwy.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\tVzuWOb.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\BgjwIzs.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\nULmayy.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\YwfShUQ.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\NOEdthr.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\dZiQLRO.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\AdFqSqI.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\PDHnekw.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\DDsKIWe.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\pMEIEhJ.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\CggOlLH.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\YYozxhy.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\lltaLtB.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\aqWYISA.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\olwmXRs.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\TVFzDGJ.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\wVLqVdN.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\eTnrihC.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\OhDuuas.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\TiJrHkw.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\RaqCBEG.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\FoAHzQa.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\CojchTp.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\HoSgUMG.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\YQILsgQ.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\VcnJrWQ.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\fvwrGPn.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\lORAnUx.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\uUaqaLZ.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\HSftZjb.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\DlYaliz.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\jamXVwF.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\AkYxJNF.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\cIFdKKQ.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\XaOQvlJ.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\GNprERM.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\jMbPYKB.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\KkgrRnK.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\WQklEEX.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\uCliaFP.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\trOGgqU.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\FwpKjzm.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\TTzmggj.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\yGiImqO.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\CfOIfYD.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\abwlNkn.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\HgyGdVA.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\jElCMDQ.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\gZYkhkE.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\zLeyWgE.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\bCcgZUE.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\aGTHLoM.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\JFXnZpn.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\fmNHENs.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\obDSVFP.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\oPwQSIs.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe File created C:\Windows\System\GqWBwyl.exe 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exedescription pid process Token: SeLockMemoryPrivilege 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe Token: SeLockMemoryPrivilege 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exedescription pid process target process PID 812 wrote to memory of 4684 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe trOGgqU.exe PID 812 wrote to memory of 4684 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe trOGgqU.exe PID 812 wrote to memory of 3948 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe fmNHENs.exe PID 812 wrote to memory of 3948 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe fmNHENs.exe PID 812 wrote to memory of 3184 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe gZYkhkE.exe PID 812 wrote to memory of 3184 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe gZYkhkE.exe PID 812 wrote to memory of 3664 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe OtUDSZX.exe PID 812 wrote to memory of 3664 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe OtUDSZX.exe PID 812 wrote to memory of 1052 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe lFIJGmJ.exe PID 812 wrote to memory of 1052 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe lFIJGmJ.exe PID 812 wrote to memory of 2144 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe GfWUYtY.exe PID 812 wrote to memory of 2144 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe GfWUYtY.exe PID 812 wrote to memory of 1632 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe AdFqSqI.exe PID 812 wrote to memory of 1632 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe AdFqSqI.exe PID 812 wrote to memory of 3964 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe QehaBJK.exe PID 812 wrote to memory of 3964 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe QehaBJK.exe PID 812 wrote to memory of 1924 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe edOOEil.exe PID 812 wrote to memory of 1924 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe edOOEil.exe PID 812 wrote to memory of 4484 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe jElCMDQ.exe PID 812 wrote to memory of 4484 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe jElCMDQ.exe PID 812 wrote to memory of 3424 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe uUaqaLZ.exe PID 812 wrote to memory of 3424 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe uUaqaLZ.exe PID 812 wrote to memory of 1648 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe ZKncBpJ.exe PID 812 wrote to memory of 1648 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe ZKncBpJ.exe PID 812 wrote to memory of 2148 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe YYozxhy.exe PID 812 wrote to memory of 2148 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe YYozxhy.exe PID 812 wrote to memory of 4516 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe zLeyWgE.exe PID 812 wrote to memory of 4516 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe zLeyWgE.exe PID 812 wrote to memory of 1008 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe nUzKnQH.exe PID 812 wrote to memory of 1008 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe nUzKnQH.exe PID 812 wrote to memory of 4608 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe oPwQSIs.exe PID 812 wrote to memory of 4608 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe oPwQSIs.exe PID 812 wrote to memory of 4612 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe hYeqxbP.exe PID 812 wrote to memory of 4612 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe hYeqxbP.exe PID 812 wrote to memory of 3536 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe tekcxCP.exe PID 812 wrote to memory of 3536 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe tekcxCP.exe PID 812 wrote to memory of 220 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe YQILsgQ.exe PID 812 wrote to memory of 220 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe YQILsgQ.exe PID 812 wrote to memory of 2072 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe kbqXHXL.exe PID 812 wrote to memory of 2072 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe kbqXHXL.exe PID 812 wrote to memory of 5044 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe UslVPWt.exe PID 812 wrote to memory of 5044 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe UslVPWt.exe PID 812 wrote to memory of 1640 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe QhhYeCK.exe PID 812 wrote to memory of 1640 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe QhhYeCK.exe PID 812 wrote to memory of 4476 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe nCkXflL.exe PID 812 wrote to memory of 4476 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe nCkXflL.exe PID 812 wrote to memory of 4072 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe bIDJHwF.exe PID 812 wrote to memory of 4072 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe bIDJHwF.exe PID 812 wrote to memory of 3220 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe EppKHxS.exe PID 812 wrote to memory of 3220 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe EppKHxS.exe PID 812 wrote to memory of 4984 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe XaOQvlJ.exe PID 812 wrote to memory of 4984 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe XaOQvlJ.exe PID 812 wrote to memory of 4720 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe izxeDlO.exe PID 812 wrote to memory of 4720 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe izxeDlO.exe PID 812 wrote to memory of 1200 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe bAKioUo.exe PID 812 wrote to memory of 1200 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe bAKioUo.exe PID 812 wrote to memory of 2676 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe HoSgUMG.exe PID 812 wrote to memory of 2676 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe HoSgUMG.exe PID 812 wrote to memory of 3304 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe bCcgZUE.exe PID 812 wrote to memory of 3304 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe bCcgZUE.exe PID 812 wrote to memory of 2648 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe lpSxuau.exe PID 812 wrote to memory of 2648 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe lpSxuau.exe PID 812 wrote to memory of 3672 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe bHlmfWU.exe PID 812 wrote to memory of 3672 812 8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe bHlmfWU.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8bc422c14a97d0f8ab8d3845e08f3720_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\trOGgqU.exeC:\Windows\System\trOGgqU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fmNHENs.exeC:\Windows\System\fmNHENs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gZYkhkE.exeC:\Windows\System\gZYkhkE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OtUDSZX.exeC:\Windows\System\OtUDSZX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lFIJGmJ.exeC:\Windows\System\lFIJGmJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GfWUYtY.exeC:\Windows\System\GfWUYtY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\AdFqSqI.exeC:\Windows\System\AdFqSqI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QehaBJK.exeC:\Windows\System\QehaBJK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\edOOEil.exeC:\Windows\System\edOOEil.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jElCMDQ.exeC:\Windows\System\jElCMDQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uUaqaLZ.exeC:\Windows\System\uUaqaLZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZKncBpJ.exeC:\Windows\System\ZKncBpJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YYozxhy.exeC:\Windows\System\YYozxhy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zLeyWgE.exeC:\Windows\System\zLeyWgE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nUzKnQH.exeC:\Windows\System\nUzKnQH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oPwQSIs.exeC:\Windows\System\oPwQSIs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\hYeqxbP.exeC:\Windows\System\hYeqxbP.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tekcxCP.exeC:\Windows\System\tekcxCP.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YQILsgQ.exeC:\Windows\System\YQILsgQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kbqXHXL.exeC:\Windows\System\kbqXHXL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UslVPWt.exeC:\Windows\System\UslVPWt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QhhYeCK.exeC:\Windows\System\QhhYeCK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nCkXflL.exeC:\Windows\System\nCkXflL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bIDJHwF.exeC:\Windows\System\bIDJHwF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EppKHxS.exeC:\Windows\System\EppKHxS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XaOQvlJ.exeC:\Windows\System\XaOQvlJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\izxeDlO.exeC:\Windows\System\izxeDlO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bAKioUo.exeC:\Windows\System\bAKioUo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HoSgUMG.exeC:\Windows\System\HoSgUMG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bCcgZUE.exeC:\Windows\System\bCcgZUE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lpSxuau.exeC:\Windows\System\lpSxuau.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bHlmfWU.exeC:\Windows\System\bHlmfWU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\AirhRBE.exeC:\Windows\System\AirhRBE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DDsKIWe.exeC:\Windows\System\DDsKIWe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GGOZTgI.exeC:\Windows\System\GGOZTgI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\olwmXRs.exeC:\Windows\System\olwmXRs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uBNkOZg.exeC:\Windows\System\uBNkOZg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VcnJrWQ.exeC:\Windows\System\VcnJrWQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tAbsqFM.exeC:\Windows\System\tAbsqFM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\AeWAyIw.exeC:\Windows\System\AeWAyIw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HSftZjb.exeC:\Windows\System\HSftZjb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jMbPYKB.exeC:\Windows\System\jMbPYKB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EUZlwTT.exeC:\Windows\System\EUZlwTT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qRMGjoI.exeC:\Windows\System\qRMGjoI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tVzuWOb.exeC:\Windows\System\tVzuWOb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\edBSXMA.exeC:\Windows\System\edBSXMA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\obDSVFP.exeC:\Windows\System\obDSVFP.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BgjwIzs.exeC:\Windows\System\BgjwIzs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aGTHLoM.exeC:\Windows\System\aGTHLoM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TiJrHkw.exeC:\Windows\System\TiJrHkw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YgBZVap.exeC:\Windows\System\YgBZVap.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lXixIOs.exeC:\Windows\System\lXixIOs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TVFzDGJ.exeC:\Windows\System\TVFzDGJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dZtKXpD.exeC:\Windows\System\dZtKXpD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sdfoTbK.exeC:\Windows\System\sdfoTbK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RaqCBEG.exeC:\Windows\System\RaqCBEG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\goupqfT.exeC:\Windows\System\goupqfT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CfOIfYD.exeC:\Windows\System\CfOIfYD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LoqHwFB.exeC:\Windows\System\LoqHwFB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WwrwkQx.exeC:\Windows\System\WwrwkQx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FPjWQau.exeC:\Windows\System\FPjWQau.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KrJOauY.exeC:\Windows\System\KrJOauY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IPlzqxj.exeC:\Windows\System\IPlzqxj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wVLqVdN.exeC:\Windows\System\wVLqVdN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ogAFKRn.exeC:\Windows\System\ogAFKRn.exe2⤵
-
C:\Windows\System\ESbIyWk.exeC:\Windows\System\ESbIyWk.exe2⤵
-
C:\Windows\System\lQELvgZ.exeC:\Windows\System\lQELvgZ.exe2⤵
-
C:\Windows\System\nULmayy.exeC:\Windows\System\nULmayy.exe2⤵
-
C:\Windows\System\uwpRHzK.exeC:\Windows\System\uwpRHzK.exe2⤵
-
C:\Windows\System\ZroijVk.exeC:\Windows\System\ZroijVk.exe2⤵
-
C:\Windows\System\ReADiZa.exeC:\Windows\System\ReADiZa.exe2⤵
-
C:\Windows\System\bJeQRIE.exeC:\Windows\System\bJeQRIE.exe2⤵
-
C:\Windows\System\pSVOsvj.exeC:\Windows\System\pSVOsvj.exe2⤵
-
C:\Windows\System\GqWBwyl.exeC:\Windows\System\GqWBwyl.exe2⤵
-
C:\Windows\System\VVzTLpF.exeC:\Windows\System\VVzTLpF.exe2⤵
-
C:\Windows\System\FREEgAC.exeC:\Windows\System\FREEgAC.exe2⤵
-
C:\Windows\System\PYOkVyN.exeC:\Windows\System\PYOkVyN.exe2⤵
-
C:\Windows\System\COUweiB.exeC:\Windows\System\COUweiB.exe2⤵
-
C:\Windows\System\XzgmSUK.exeC:\Windows\System\XzgmSUK.exe2⤵
-
C:\Windows\System\cHkVgOj.exeC:\Windows\System\cHkVgOj.exe2⤵
-
C:\Windows\System\RdpLlYD.exeC:\Windows\System\RdpLlYD.exe2⤵
-
C:\Windows\System\YwfShUQ.exeC:\Windows\System\YwfShUQ.exe2⤵
-
C:\Windows\System\cTgZejR.exeC:\Windows\System\cTgZejR.exe2⤵
-
C:\Windows\System\FoAHzQa.exeC:\Windows\System\FoAHzQa.exe2⤵
-
C:\Windows\System\xFCRiDm.exeC:\Windows\System\xFCRiDm.exe2⤵
-
C:\Windows\System\YVrkDrW.exeC:\Windows\System\YVrkDrW.exe2⤵
-
C:\Windows\System\KkgrRnK.exeC:\Windows\System\KkgrRnK.exe2⤵
-
C:\Windows\System\gORXZok.exeC:\Windows\System\gORXZok.exe2⤵
-
C:\Windows\System\uTpUFhW.exeC:\Windows\System\uTpUFhW.exe2⤵
-
C:\Windows\System\RAitzSV.exeC:\Windows\System\RAitzSV.exe2⤵
-
C:\Windows\System\pMEIEhJ.exeC:\Windows\System\pMEIEhJ.exe2⤵
-
C:\Windows\System\CcxFJyP.exeC:\Windows\System\CcxFJyP.exe2⤵
-
C:\Windows\System\vKRWnKK.exeC:\Windows\System\vKRWnKK.exe2⤵
-
C:\Windows\System\MNQlPhb.exeC:\Windows\System\MNQlPhb.exe2⤵
-
C:\Windows\System\TYYjKBN.exeC:\Windows\System\TYYjKBN.exe2⤵
-
C:\Windows\System\IrFzaAv.exeC:\Windows\System\IrFzaAv.exe2⤵
-
C:\Windows\System\DlYaliz.exeC:\Windows\System\DlYaliz.exe2⤵
-
C:\Windows\System\WmbaRyG.exeC:\Windows\System\WmbaRyG.exe2⤵
-
C:\Windows\System\wsbPfcP.exeC:\Windows\System\wsbPfcP.exe2⤵
-
C:\Windows\System\jamXVwF.exeC:\Windows\System\jamXVwF.exe2⤵
-
C:\Windows\System\WQklEEX.exeC:\Windows\System\WQklEEX.exe2⤵
-
C:\Windows\System\FtQBTof.exeC:\Windows\System\FtQBTof.exe2⤵
-
C:\Windows\System\oJLFZYL.exeC:\Windows\System\oJLFZYL.exe2⤵
-
C:\Windows\System\dzjhBGD.exeC:\Windows\System\dzjhBGD.exe2⤵
-
C:\Windows\System\BnPxJxM.exeC:\Windows\System\BnPxJxM.exe2⤵
-
C:\Windows\System\qrfQJaS.exeC:\Windows\System\qrfQJaS.exe2⤵
-
C:\Windows\System\fvwrGPn.exeC:\Windows\System\fvwrGPn.exe2⤵
-
C:\Windows\System\RDXaZEn.exeC:\Windows\System\RDXaZEn.exe2⤵
-
C:\Windows\System\CggOlLH.exeC:\Windows\System\CggOlLH.exe2⤵
-
C:\Windows\System\ojIUCGX.exeC:\Windows\System\ojIUCGX.exe2⤵
-
C:\Windows\System\RbIEuzy.exeC:\Windows\System\RbIEuzy.exe2⤵
-
C:\Windows\System\FwpKjzm.exeC:\Windows\System\FwpKjzm.exe2⤵
-
C:\Windows\System\SJBqJTR.exeC:\Windows\System\SJBqJTR.exe2⤵
-
C:\Windows\System\seIrftu.exeC:\Windows\System\seIrftu.exe2⤵
-
C:\Windows\System\uCliaFP.exeC:\Windows\System\uCliaFP.exe2⤵
-
C:\Windows\System\rCjfhVz.exeC:\Windows\System\rCjfhVz.exe2⤵
-
C:\Windows\System\lORAnUx.exeC:\Windows\System\lORAnUx.exe2⤵
-
C:\Windows\System\eGzdJlg.exeC:\Windows\System\eGzdJlg.exe2⤵
-
C:\Windows\System\CHlMVWU.exeC:\Windows\System\CHlMVWU.exe2⤵
-
C:\Windows\System\vKwbfDz.exeC:\Windows\System\vKwbfDz.exe2⤵
-
C:\Windows\System\VVUstMZ.exeC:\Windows\System\VVUstMZ.exe2⤵
-
C:\Windows\System\AJMBTym.exeC:\Windows\System\AJMBTym.exe2⤵
-
C:\Windows\System\tagitSf.exeC:\Windows\System\tagitSf.exe2⤵
-
C:\Windows\System\vjALNym.exeC:\Windows\System\vjALNym.exe2⤵
-
C:\Windows\System\YtdLxPs.exeC:\Windows\System\YtdLxPs.exe2⤵
-
C:\Windows\System\GSiXgba.exeC:\Windows\System\GSiXgba.exe2⤵
-
C:\Windows\System\CXLHcaY.exeC:\Windows\System\CXLHcaY.exe2⤵
-
C:\Windows\System\BCJHNtw.exeC:\Windows\System\BCJHNtw.exe2⤵
-
C:\Windows\System\EBMYUQL.exeC:\Windows\System\EBMYUQL.exe2⤵
-
C:\Windows\System\NzuTOau.exeC:\Windows\System\NzuTOau.exe2⤵
-
C:\Windows\System\JRBUKgl.exeC:\Windows\System\JRBUKgl.exe2⤵
-
C:\Windows\System\abwlNkn.exeC:\Windows\System\abwlNkn.exe2⤵
-
C:\Windows\System\eRfUqjF.exeC:\Windows\System\eRfUqjF.exe2⤵
-
C:\Windows\System\NOEdthr.exeC:\Windows\System\NOEdthr.exe2⤵
-
C:\Windows\System\TvZogFk.exeC:\Windows\System\TvZogFk.exe2⤵
-
C:\Windows\System\iJrIDdA.exeC:\Windows\System\iJrIDdA.exe2⤵
-
C:\Windows\System\jTutPiW.exeC:\Windows\System\jTutPiW.exe2⤵
-
C:\Windows\System\MmIaqwQ.exeC:\Windows\System\MmIaqwQ.exe2⤵
-
C:\Windows\System\FcdJdGo.exeC:\Windows\System\FcdJdGo.exe2⤵
-
C:\Windows\System\nfQEbYf.exeC:\Windows\System\nfQEbYf.exe2⤵
-
C:\Windows\System\FKbnKbq.exeC:\Windows\System\FKbnKbq.exe2⤵
-
C:\Windows\System\DwNGFMj.exeC:\Windows\System\DwNGFMj.exe2⤵
-
C:\Windows\System\ahxOxZd.exeC:\Windows\System\ahxOxZd.exe2⤵
-
C:\Windows\System\YPggAgs.exeC:\Windows\System\YPggAgs.exe2⤵
-
C:\Windows\System\aqWYISA.exeC:\Windows\System\aqWYISA.exe2⤵
-
C:\Windows\System\TTzmggj.exeC:\Windows\System\TTzmggj.exe2⤵
-
C:\Windows\System\AkYxJNF.exeC:\Windows\System\AkYxJNF.exe2⤵
-
C:\Windows\System\vJEauai.exeC:\Windows\System\vJEauai.exe2⤵
-
C:\Windows\System\qyADOie.exeC:\Windows\System\qyADOie.exe2⤵
-
C:\Windows\System\WoswTaz.exeC:\Windows\System\WoswTaz.exe2⤵
-
C:\Windows\System\wSKvLvC.exeC:\Windows\System\wSKvLvC.exe2⤵
-
C:\Windows\System\EADTCCS.exeC:\Windows\System\EADTCCS.exe2⤵
-
C:\Windows\System\acpzMTj.exeC:\Windows\System\acpzMTj.exe2⤵
-
C:\Windows\System\qfawoiz.exeC:\Windows\System\qfawoiz.exe2⤵
-
C:\Windows\System\TeUkiML.exeC:\Windows\System\TeUkiML.exe2⤵
-
C:\Windows\System\WKnzDpr.exeC:\Windows\System\WKnzDpr.exe2⤵
-
C:\Windows\System\rWclCbZ.exeC:\Windows\System\rWclCbZ.exe2⤵
-
C:\Windows\System\DIyeNyg.exeC:\Windows\System\DIyeNyg.exe2⤵
-
C:\Windows\System\OlFFHwy.exeC:\Windows\System\OlFFHwy.exe2⤵
-
C:\Windows\System\lltaLtB.exeC:\Windows\System\lltaLtB.exe2⤵
-
C:\Windows\System\cYcfIoL.exeC:\Windows\System\cYcfIoL.exe2⤵
-
C:\Windows\System\kZakoxO.exeC:\Windows\System\kZakoxO.exe2⤵
-
C:\Windows\System\CTogdTY.exeC:\Windows\System\CTogdTY.exe2⤵
-
C:\Windows\System\OvboKUt.exeC:\Windows\System\OvboKUt.exe2⤵
-
C:\Windows\System\eVlBYlC.exeC:\Windows\System\eVlBYlC.exe2⤵
-
C:\Windows\System\xKgiAPj.exeC:\Windows\System\xKgiAPj.exe2⤵
-
C:\Windows\System\GNprERM.exeC:\Windows\System\GNprERM.exe2⤵
-
C:\Windows\System\xqdARbg.exeC:\Windows\System\xqdARbg.exe2⤵
-
C:\Windows\System\iDuwwpl.exeC:\Windows\System\iDuwwpl.exe2⤵
-
C:\Windows\System\MrDesqs.exeC:\Windows\System\MrDesqs.exe2⤵
-
C:\Windows\System\CuIqdVV.exeC:\Windows\System\CuIqdVV.exe2⤵
-
C:\Windows\System\tcQpkRO.exeC:\Windows\System\tcQpkRO.exe2⤵
-
C:\Windows\System\CojchTp.exeC:\Windows\System\CojchTp.exe2⤵
-
C:\Windows\System\HgyGdVA.exeC:\Windows\System\HgyGdVA.exe2⤵
-
C:\Windows\System\QPPemXe.exeC:\Windows\System\QPPemXe.exe2⤵
-
C:\Windows\System\QBMXPmL.exeC:\Windows\System\QBMXPmL.exe2⤵
-
C:\Windows\System\AHlxOou.exeC:\Windows\System\AHlxOou.exe2⤵
-
C:\Windows\System\kYYiohj.exeC:\Windows\System\kYYiohj.exe2⤵
-
C:\Windows\System\Exetcjw.exeC:\Windows\System\Exetcjw.exe2⤵
-
C:\Windows\System\asOQyiL.exeC:\Windows\System\asOQyiL.exe2⤵
-
C:\Windows\System\hwpDMpg.exeC:\Windows\System\hwpDMpg.exe2⤵
-
C:\Windows\System\AGjbXTp.exeC:\Windows\System\AGjbXTp.exe2⤵
-
C:\Windows\System\KsFMmKa.exeC:\Windows\System\KsFMmKa.exe2⤵
-
C:\Windows\System\eTnrihC.exeC:\Windows\System\eTnrihC.exe2⤵
-
C:\Windows\System\vqwmXvt.exeC:\Windows\System\vqwmXvt.exe2⤵
-
C:\Windows\System\ZprNlYz.exeC:\Windows\System\ZprNlYz.exe2⤵
-
C:\Windows\System\fMCzMWU.exeC:\Windows\System\fMCzMWU.exe2⤵
-
C:\Windows\System\OhDuuas.exeC:\Windows\System\OhDuuas.exe2⤵
-
C:\Windows\System\mPNhHos.exeC:\Windows\System\mPNhHos.exe2⤵
-
C:\Windows\System\cIFdKKQ.exeC:\Windows\System\cIFdKKQ.exe2⤵
-
C:\Windows\System\PDHnekw.exeC:\Windows\System\PDHnekw.exe2⤵
-
C:\Windows\System\VwcPqUa.exeC:\Windows\System\VwcPqUa.exe2⤵
-
C:\Windows\System\JFXnZpn.exeC:\Windows\System\JFXnZpn.exe2⤵
-
C:\Windows\System\dZiQLRO.exeC:\Windows\System\dZiQLRO.exe2⤵
-
C:\Windows\System\QajveHn.exeC:\Windows\System\QajveHn.exe2⤵
-
C:\Windows\System\HtIFYKs.exeC:\Windows\System\HtIFYKs.exe2⤵
-
C:\Windows\System\yGiImqO.exeC:\Windows\System\yGiImqO.exe2⤵
-
C:\Windows\System\PwbnnLY.exeC:\Windows\System\PwbnnLY.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\AdFqSqI.exeFilesize
1.0MB
MD5b50cf413601a28e378398f8940c74d80
SHA120ae46dbae102c59e832ab31b0f541200873881e
SHA2568c4904508731518cb36019bd2c7bf9d38f070f2cfeb83717c413f765cb92ce18
SHA51221e3a4022db2be199427c42fdee256ab0f2ac8869415061a0e462bf87e54052fc9233d3d4ebc6c0531bdafe8ff1e2341957cce25e6e70cc88a9d066b9cea5b90
-
C:\Windows\System\AirhRBE.exeFilesize
1.0MB
MD59e0e107d12d1245e9422bc3c0eceb61f
SHA1f3c24ee0d78af3d08a32732c021a062065751f4c
SHA2566872f86361cd8d05dd8435f60903426e7d081fa0fc0e55c3f7d76098f035f455
SHA51245959860efb2b5939d85f572830bc57049bc3af91724e6019ca0aff88b3528757e3d12dc2e1978137c9adea4e764a6647b9efac600de160968768be2101ecd8f
-
C:\Windows\System\EppKHxS.exeFilesize
1.0MB
MD5512deae8cddcf023318ede40d9dc8dc8
SHA1af57459b5cb27bc843d2b24e001f15abdc401e95
SHA25685660ceb5d48e17efb2c4ec002647d4d73655d61df0672be488646eb9f2f1450
SHA512cbe6079eaeae431e78c94b994df62e89488729d53e46b9a6bc1a0eb0f61cd1a60cc6ad3e8c68c16b61792d324bbe99e2780bc3cbd7ac8967a10f8fe709fce8a9
-
C:\Windows\System\GfWUYtY.exeFilesize
1.0MB
MD57590227577eac796187b03a8ba76583d
SHA1b13cd4f19c11d5494cdb67c31b548ae221bc21a5
SHA256f99f4d0c63f99d953e114e682bb61230be9c9bbb1f8370ab77c0b54f714f3313
SHA512e770dbc6284e46e75655cc71998bb0d02e8a4ed57ee4bf78150b8ebf41c6c257809670612f07edda176e6cc683791f0e7dd7bc395618a673f72bdc280ea09f86
-
C:\Windows\System\HoSgUMG.exeFilesize
1.0MB
MD55f9ade64a6eb09825d500e574c31f975
SHA1a414cda5f6de3cd32d3f01f07123b91e2643bae4
SHA2566b865c014465c183a6f3f3e22f3569548d0325ea3b6a49a938914b639e718f06
SHA5129b836f11767aeed5e8e86e4b4972194dc166d0f393bc7552b8409fff0c6654a1ee204240918a33ac7c45cdff0972caaf5b3033e744526f8a19dcea2adf078b4f
-
C:\Windows\System\OtUDSZX.exeFilesize
1.0MB
MD55563731788f5f2f56c5fd014594b2dab
SHA111c1d5f52770340c66216808f8690ffc7147fad6
SHA2569ec0291bbdcd83df6f703dc2fbcaf0da4891297c198baf9ec20b0a90e0b91881
SHA5121a0a9303d80c9cc7b8ba352e458c941fc0ca070602b76de6c92812bc5c82b736defbe220cd5b69b744369628230f319b352a8d412bdf9094c63eb57d8ae923e3
-
C:\Windows\System\QehaBJK.exeFilesize
1.0MB
MD503c7d092122501e634c293254e55e9ec
SHA1960437d12ac90705845d6fe0a7a16a755d85349e
SHA256bbdff047baee6e0217c28fdb6048961d79d6c5eb738faa82be1cec34f6437896
SHA512e2323ca68be31bc3ab237b3b6be8d57c2ca394597b1fa0e5f84a2eb438aba1e1495af0c5338eba8f367f50aef2f3434753faa24b43a0dd06154685ce03034ea0
-
C:\Windows\System\QhhYeCK.exeFilesize
1.0MB
MD56abdafc35d8701f0ce3b2656fdd06844
SHA112cb5e9e0c4e4122cd3a365bb94755edb566af44
SHA256cfcdb9490c3151ccde252a44a05ae837fe3292495a3f4861e8685106c05472aa
SHA512dc5b2ed2ca693898279666a70a8af47ed01321b3e4a98edb8e74c71d9a2e2a77e797f18f169899ccca8ee17976c8663bf0b5de11881c09c155a9f0e38733571a
-
C:\Windows\System\UslVPWt.exeFilesize
1.0MB
MD5ae4385cf013021750d1e5265e256fa81
SHA11e327d6724a689acae86c62ccf25583a41ea43a8
SHA25654dd758b3e5bfa4392d758859b1dac9e449743dcde084c48a82450464b7829c5
SHA5126440df292b9bf0c18dc278bf8f9753d6a85bdedb0b7db6654e63b7a6029436f7458824bc96485be3096d11e2c6719b5e1fcb72fbdcacf348c4a019597618d0ba
-
C:\Windows\System\XaOQvlJ.exeFilesize
1.0MB
MD50447fab86b84d7bb4b9840ca47306e74
SHA1742fae05f72305644b418cba72e9795cd5c16760
SHA2563e7571df476c4fbea77793d38c8753b418d25ed51a902843fb38b7b16a6067b5
SHA512f0f62af0fa1b07b0d44f5518b6bb224bf81eac9632779888d5c1a4d83c41e1d0e4bcbaa7be66b1105d01a2831523cffcc0d5716862eff6d96b1d82f066a36a24
-
C:\Windows\System\YQILsgQ.exeFilesize
1.0MB
MD59d3830de2ee87f4ffc3a5fd80e68d0e4
SHA144b62f7da06cc204b8c79602e9497e9c9ddf214a
SHA256401eb867013cc8dbfab9fb4ff40a499a64abb7e0a4bf1bee7bc4d21938c4fbef
SHA512147fac550ded93b5bad195738e515bc0aacebc1c7ea422f8b19e0ad68b036fef40a943259a5ab162c4061b899f551abf7849ba5aaf36bfea94c301d6abc2d01c
-
C:\Windows\System\YYozxhy.exeFilesize
1.0MB
MD5792c6f1f3ba6af5bc4bf4c5f0d67d488
SHA132bb193d103f3b2a47bbfa5f698c9eb2d5a899b1
SHA256cde9a169e61e82d46452cd66e080d681a641b030402640d2b949da447adc4a5e
SHA512e9e0ad1a9ad3b79a3650d3d58d4993af8f0f37464659a82b88f8467fd493ee09253d5f46e9a3ae50a120d8b3bfbc68e17d479b8c26f3e5e9d51fac905218da61
-
C:\Windows\System\ZKncBpJ.exeFilesize
1.0MB
MD55641c845cca7cb902850e71f7f0ffca4
SHA1d298dbe081c89bc013c7a9c33bdbe9cc8dc73d69
SHA256988d039a068fa2f636f7fd925ecc6c36133490b7c882a13b45323e7903d73e6f
SHA512093cd0fc804d8fc5008f06806d356ebc4fade32ba6a75b941f55ba2a464fe09633e0a25fe8b2b1e2faa7d80c98be2c847ff5ccff66a06f901bcc61c26ead426a
-
C:\Windows\System\bAKioUo.exeFilesize
1.0MB
MD53be3751d16ca3592e14d99fc9bca22b5
SHA1e154c28a46ebf6beffe6d82bc49060d2e99224cb
SHA2564fafa87ca3d70529581bf558c5d5689f9e2f9784fa00997ee1bf9c8ecb283263
SHA51295892cf0c3a078f33ca24d941edcc8347a105f738e0a5b534d18f166a791e7192571306f9ea0b6e779e859e87fabc3a023c23138b95df00b9fb9ad09ded08c67
-
C:\Windows\System\bCcgZUE.exeFilesize
1.0MB
MD5150995a01c47098b5ae835a7e2a3371e
SHA171a3e46faeebfcad9d4c8c0afd6571214ac8e32b
SHA25615cfe563d5884cdd0a4a9c2ef7a8fb8e91b7cbc71a55e036f9999206bbac3df0
SHA512c25fde299af63ac2269a20f32a0c38ff055f0e65a3beacbcc7f16a2ece844dd82b3a0f93c73f22311ebbb3613cfa6bcb32eeb44ebef4f8fe819e529d58beb150
-
C:\Windows\System\bHlmfWU.exeFilesize
1.0MB
MD5a0ce7f115300534068f1daa60fa74d27
SHA18debebb0b595d97046a6a3ddff4b315a3ff59445
SHA256232361ed2c5cf00e2644fb030a68cb40408f9f9c39d182c93f95e2aabd1c1c05
SHA5128da7a9a3385a59062a5df154b071eb4655545b79c40fdc4db3127a63b47959a222762057451a4ec02dd466612b4b2661482c21ce7812f4e7af1765456853d5b5
-
C:\Windows\System\bIDJHwF.exeFilesize
1.0MB
MD5fc4b00a563789d9ce386cb1430fe0d87
SHA189072abc6dd03dac887a8c515816d6a99b28734e
SHA256c65d6b947d7e788085e8908e49d1a50c3a1e753cee0a532bee056af0cb1a05c1
SHA512788c1309c3a41970ef50fa6793fbdbd03a02de75cefb4eab38484fbf6e59ea971ef0758eb2b955cccdc8c36e2799b7b1f369b3d6437396ef3ddacc99cca695a4
-
C:\Windows\System\edOOEil.exeFilesize
1.0MB
MD543d859837c140df1284cc26d4d4be407
SHA19ba09bd09832572307e5978e45a55f963cd33919
SHA2569f05f612eac82f945c03585e1760a869c47000accce6d882336d2e3258f4d416
SHA512e9bb5cf4b4650a775ca12eb1f7a6f558dbb04581e65ff4aeda310b9cb85922129aa50f7c6d31719db477419d162b58bc8b926e7ddac236c815deeefe9989d319
-
C:\Windows\System\fmNHENs.exeFilesize
1.0MB
MD5e4c8bc3b6fed033986e08b312a317bae
SHA18c60058059d3bab4fa510731a75b04999f18667e
SHA2569dd65a79d093615e3c4fa39902f494a08e2bd6e6333287b520f1212f446eaae5
SHA512f27615bbf2a8f645c526fd1ca4f0fd04b370063cdb08a0b98f5e8b9f1742fc1f9c7cda24c82e1828a70536d8b5eedaa7195a3e12f41b710d020eaa0c77d58caf
-
C:\Windows\System\gZYkhkE.exeFilesize
1.0MB
MD586290511b21a54f5133317fce612ff0a
SHA1b28553c9dfc6ef4208984c85bcf05602007070af
SHA256a3625d0c2a9944b926e308f41a00e7301b7dff31cada529b5af9d60d1b82e59a
SHA51234b663f39d1b710f1820094c8b2c383cf3f75f6c0e2286da0ee9a8849ed57fd1750e3979edbc45e08e1f7ba72ba04c1f77a069e02908d773deb8ba02ed36504a
-
C:\Windows\System\hYeqxbP.exeFilesize
1.0MB
MD516a333d4b77cf30113f085a0b121e38e
SHA1b53be8c29cb1c86a6aab73edeeb94e5c6f1dd806
SHA2564fce4a2d4d345b703a691a48b4f2dff641ab010d9146ad3a94859f9ddfd0e6bb
SHA51273b6bc2d6bbd3813c982745ccdf29858d07446600c1c28ceb2ebd12d31069bca9464d00345df6ef1fd03928c95e3ee33ca1e7f6597632eab6e372ff4f48c256e
-
C:\Windows\System\izxeDlO.exeFilesize
1.0MB
MD5bab7aaf7fbc80fc2fa99bbb52f6d85c2
SHA1fe90388d3ad8188453d28ee4ede2944a156b5439
SHA2567771dc18c9359827d9cc36fd8ff73ac93c508691ab6429f149e5a91f467dd841
SHA512fb43a04f669d6cd29c1c0ca53076cb6909daf0f40c591791d14ec3b6e80441a6ea2d522e02105fba127a388a9afdab272c9b9d575d901dd32c851a43711b601b
-
C:\Windows\System\jElCMDQ.exeFilesize
1.0MB
MD521d6be6d0756c880b08a40402e7915b2
SHA1997da09f5a8b16aaff52213c6ad11247597c4c04
SHA25694d651d39e05a7b4d23f692b7973c35b951abefaca725ea56d88b803d4426222
SHA5125f46c3d06e23643db8c3f75b69e1379f9cede9bb07c03fc1dfd84d0cd06bcb93c82c61cb61190d46a85ab73910b8e498a2a49fec080ad5e93d0163a44dac1337
-
C:\Windows\System\kbqXHXL.exeFilesize
1.0MB
MD57077ef66981c0360fc8e4614a2ce43cb
SHA12daf9d45a093ec74a20fb782a9561737ac5f94ab
SHA2565dfb947f0fd64b52c1b3628d75145910c475fa765d25a759aab99713cc8f41ac
SHA512cd62743fa0c2d1eb2e5e46da2281e4c3ba8e78427a7c30d48fc74433fb694ce0ebd736cf6c63271819208e3c41aa0b3f0f4ef848855a0ab163de799842295eb1
-
C:\Windows\System\lFIJGmJ.exeFilesize
1.0MB
MD52f87fde6dd98dfcc847e8a9d4d45b1d5
SHA123b595afac61f0c40b2e029c2a48956d640d3d3d
SHA256472533fafa4d4d51e54802250b3444224b56e36272a3787f235553a3fe4f73db
SHA512e59af24b105641843dadef249e2cb2eaa0c385ef7d3ae49542b25ca53eae4e2a29c875abf9ad050af26e01aa19efc47d61fce7dfc990f125fd43c48e6aebc572
-
C:\Windows\System\lpSxuau.exeFilesize
1.0MB
MD561416f609f53117bd3d30f81d0f29717
SHA106a9ba0909b4217cf8fdcd5b9241cd9fe3210bce
SHA2565bbc223966368e9146e8a9dc1a09ffc078e0ec3a3da800e30172e3d28c2b67d5
SHA51217ff00b80e87024266a14e5dda21543e3ae08c38bfc95650b073e01c267afd6defd25481a24f55394815e01ca1ae199784e696cf5daaead2fd1d30fee26cb272
-
C:\Windows\System\nCkXflL.exeFilesize
1.0MB
MD5f0eafd0caf0a6edc9172939321146854
SHA16f234b9df19cb28060b167b47727a519afc6b994
SHA25627dbb8b82d6c5e74240c297d160e8ab2720b1ba47ad36b7f178c816dc0a540a3
SHA512762403dd35f71a84aab012b7aa29db43fa04e08704a17fee6f687187ea85e24f4e79337252ec83b3a5b085efebd2e2d37d83b473244a71e1e42a199f629cb23a
-
C:\Windows\System\nUzKnQH.exeFilesize
1.0MB
MD593efc9c005899dfff03648a7b1a76e81
SHA1201f88dcf07764e2e89af962a8262efb32ca4982
SHA256272df166163b4c85c3c076e5c6b108847c7d9ca9450227e812e365bdd70fc1ff
SHA5127a941244b39be526a9e70eb915b05aba52ca3e68680dea67b05e45485e5a7161b8bfca4c7c9e1289909f558503ec919e0287af81a46b9da3af1ac5ea27b8d130
-
C:\Windows\System\oPwQSIs.exeFilesize
1.0MB
MD5ae69e133e2ea1b1ead882acab803f65c
SHA184b68363678c04bc964d7bd6b7642806dcbded43
SHA256ef327df54f44dc8c85182c8147fc094ce5679c6e5ed7a9ee0af20df79d7ce47d
SHA51273726d7f2c81282004836e9358d2cbdf7532d8766b18b88db9fff22adfcfd0807b7c6aabcd68ec06b480044693696b478e375719f2396c8c36e53c9ddb0c3055
-
C:\Windows\System\tekcxCP.exeFilesize
1.0MB
MD5eda4a535aa5074b8254b69378da50910
SHA1f5dda2fad31f0283921ae0948674b546313a1506
SHA2565e2f9978b9c265f3c2100a1722094519835e9c9f65bd4cf6765d6ba211c0a432
SHA5127416646f9fbd5b15d77ca4723a619dd4a70b060e9bf66197a4bc7542d0e7b5d8989c9e1d1eff85d93b4ef5542e840ecf281ffb8353247137ab281f24e44e133d
-
C:\Windows\System\trOGgqU.exeFilesize
1.0MB
MD54727ecd45370c9638968c3453cfc2016
SHA1f6500733d7969e4e489d8db59fd9503bad50f798
SHA25674599b1431e9645f965c1eb1a7e08a4da157ed10e0f15ea7ea8fd3ecbb44742f
SHA512b8af8139490d9a7a2d1533600ea7b39eeb091f74e79c7f6db68e0ef7a272aab9357ca9785d605449462f73d98f2023599d301528ca0f3cc0e0ca6cb909f466e1
-
C:\Windows\System\uUaqaLZ.exeFilesize
1.0MB
MD5993585fe06df80bd0da3e8f053ca9790
SHA1f15f3b3eb733bd965e131585d4854d908a456938
SHA2564c2cca69a1373dbf99baee0fa6508258d2d3907d51faad49a0e31e3118467f8e
SHA51205471a85434d4e62ae53599c0749a37da913f7733d5f54a8bf461254128619091d3234c0cd6b826f16978ecaa40ab693d131d9d79d2a7bef510b2fbb8bddf8d5
-
C:\Windows\System\zLeyWgE.exeFilesize
1.0MB
MD57f57f4334464b03ae6a9ff53c228f74a
SHA1602d132319c2b2334d915c6665c67e121f3e5496
SHA25637bb06ff4b1bf061453359ab758f085418c522a68902e53d2817283984a7958e
SHA512409a21c51af3d1b87dc2bfa53f8243ffec306dadb218d5ca4fb5b5aa65f533fd05dd1c996f070592a241b1622a821b2bacabf5793d1fe799e546ae6a46ab1758
-
memory/812-0-0x0000025261FC0000-0x0000025261FD0000-memory.dmpFilesize
64KB