Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 13:45
Behavioral task
behavioral1
Sample
813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe
-
Size
1010KB
-
MD5
813be4ec38a695a2058343e26fb6c040
-
SHA1
8514db714f99055fb7622c58602c11c482f58e93
-
SHA256
e44119e0ca3ed5d923b3db9ca3454f19e59bebcd05bba7ed2b0ff9da44fd09c8
-
SHA512
e4355ace498d8dfc177df0fdb00501ac459c640afad8e7a78e850d9bafb5f7708f681c6da6600abacb8cfbe3c69d3fa040e9ef505b09ea20a2d2869fb299d509
-
SSDEEP
24576:GezaTnG99Q8FcNrpyNdfE0bLBgDOp2iSLz9LbBwlKensPLNx:GezaTF8FcNkNdfE0pZ9oztFwIhL3
Malware Config
Signatures
-
XMRig Miner payload 32 IoCs
Processes:
resource yara_rule \Windows\system\mlafako.exe xmrig \Windows\system\WiRZcUB.exe xmrig C:\Windows\system\HhrqXzq.exe xmrig C:\Windows\system\hRggsSl.exe xmrig C:\Windows\system\pbChuyt.exe xmrig C:\Windows\system\WbcAllU.exe xmrig C:\Windows\system\oWxgjXU.exe xmrig \Windows\system\xNGrCmf.exe xmrig C:\Windows\system\OKcwkcm.exe xmrig C:\Windows\system\RXtfwUL.exe xmrig C:\Windows\system\IrFehUu.exe xmrig C:\Windows\system\yPttjij.exe xmrig C:\Windows\system\OstnEBS.exe xmrig C:\Windows\system\QhFtYFv.exe xmrig C:\Windows\system\NhQZGlq.exe xmrig C:\Windows\system\oVwoTho.exe xmrig C:\Windows\system\AeQhKeW.exe xmrig C:\Windows\system\JvNOnhI.exe xmrig C:\Windows\system\gfjBzfm.exe xmrig C:\Windows\system\LzvHDqp.exe xmrig C:\Windows\system\TeUSmqI.exe xmrig C:\Windows\system\HyYpXXN.exe xmrig C:\Windows\system\mRkXGeX.exe xmrig C:\Windows\system\jFZaPtJ.exe xmrig C:\Windows\system\ugUDLlN.exe xmrig C:\Windows\system\esdSSwm.exe xmrig C:\Windows\system\fmlsUaN.exe xmrig C:\Windows\system\QGxZnEI.exe xmrig C:\Windows\system\KdpidcT.exe xmrig C:\Windows\system\GJqkDNU.exe xmrig C:\Windows\system\fQCCHDq.exe xmrig C:\Windows\system\gsjGcpC.exe xmrig -
Executes dropped EXE 64 IoCs
Processes:
mlafako.exeWiRZcUB.exeHhrqXzq.exehRggsSl.exepbChuyt.exeWbcAllU.exeoWxgjXU.exegsjGcpC.exefQCCHDq.exexNGrCmf.exeGJqkDNU.exeKdpidcT.exeOKcwkcm.exeQGxZnEI.exefmlsUaN.exeesdSSwm.exeugUDLlN.exejFZaPtJ.exemRkXGeX.exeHyYpXXN.exeTeUSmqI.exeRXtfwUL.exeLzvHDqp.exeIrFehUu.exegfjBzfm.exeJvNOnhI.exeAeQhKeW.exeoVwoTho.exeNhQZGlq.exeyPttjij.exeQhFtYFv.exeOstnEBS.exelMyWxzg.exeBAjHoTp.exewcPSxVX.exeXaHGtPv.exeskhqxqt.exeTEdVIuR.execvXzQZG.exeLawOlQT.exeUyesvyC.exelfdWRYx.exedeZAosz.exeIyaSong.exeWxYudce.exevQZFHnF.exerodEsWo.exeQwaOjpl.exeEgtolwT.exeoKpuNRU.exeiYbGDXh.exeeBNqAxi.exelYxCXlT.exebljCWEL.exeXLnmDuF.exeDsQMwYe.exebHXNJDG.exebsYjTZD.exekmHsZQu.exesBMqsUF.exeIEmIJfF.exelIKSiqK.exezkCiXRB.exebdvfzhU.exepid process 2792 mlafako.exe 2916 WiRZcUB.exe 2392 HhrqXzq.exe 2100 hRggsSl.exe 2720 pbChuyt.exe 2744 WbcAllU.exe 2644 oWxgjXU.exe 2924 gsjGcpC.exe 2764 fQCCHDq.exe 2752 xNGrCmf.exe 2656 GJqkDNU.exe 2568 KdpidcT.exe 2524 OKcwkcm.exe 2564 QGxZnEI.exe 3024 fmlsUaN.exe 2780 esdSSwm.exe 1292 ugUDLlN.exe 2800 jFZaPtJ.exe 2860 mRkXGeX.exe 2908 HyYpXXN.exe 3036 TeUSmqI.exe 2284 RXtfwUL.exe 2008 LzvHDqp.exe 2024 IrFehUu.exe 1976 gfjBzfm.exe 2696 JvNOnhI.exe 2616 AeQhKeW.exe 1248 oVwoTho.exe 1560 NhQZGlq.exe 2092 yPttjij.exe 2232 QhFtYFv.exe 2052 OstnEBS.exe 324 lMyWxzg.exe 2756 BAjHoTp.exe 2952 wcPSxVX.exe 2056 XaHGtPv.exe 620 skhqxqt.exe 532 TEdVIuR.exe 320 cvXzQZG.exe 980 LawOlQT.exe 700 UyesvyC.exe 1484 lfdWRYx.exe 612 deZAosz.exe 3060 IyaSong.exe 1800 WxYudce.exe 852 vQZFHnF.exe 2004 rodEsWo.exe 832 QwaOjpl.exe 2344 EgtolwT.exe 2244 oKpuNRU.exe 444 iYbGDXh.exe 1084 eBNqAxi.exe 1348 lYxCXlT.exe 1784 bljCWEL.exe 2036 XLnmDuF.exe 1392 DsQMwYe.exe 1928 bHXNJDG.exe 1860 bsYjTZD.exe 1732 kmHsZQu.exe 1868 sBMqsUF.exe 840 IEmIJfF.exe 584 lIKSiqK.exe 1932 zkCiXRB.exe 2496 bdvfzhU.exe -
Loads dropped DLL 64 IoCs
Processes:
813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exepid process 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe -
Drops file in Windows directory 64 IoCs
Processes:
813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exedescription ioc process File created C:\Windows\System\DsQMwYe.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\slamaAC.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\qNjcrQu.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\EAMPyvh.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\wcPSxVX.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\esdSSwm.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\oVwoTho.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\oKpuNRU.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\MwrfiGQ.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\epSFdPJ.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\XLghFmJ.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\VwSebLD.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\xNGrCmf.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\dIrbjGv.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\jFZaPtJ.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\oixNRws.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\hhfDjwA.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\irnnkMJ.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\FAhlrQu.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\ugUDLlN.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\iYbGDXh.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\tVIHSkR.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\TEdVIuR.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\WxYudce.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\LAYKxvb.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\akiXYkF.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\RXtfwUL.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\NhQZGlq.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\vQZFHnF.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\iQtWCKD.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\efwCfgh.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\LocDjsG.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\EgtolwT.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\bdvfzhU.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\bZIoLYU.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\tczIEMq.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\IrFehUu.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\sBMqsUF.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\BetMOqn.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\wdcPKGo.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\KdpidcT.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\UdhOSCl.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\qLlEPEU.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\QhFtYFv.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\zkCiXRB.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\JZNlusf.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\WWuqyAF.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\WwhLZTq.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\KmsDsJJ.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\UhrUqNu.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\PrTIzzQ.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\cvXzQZG.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\QwaOjpl.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\HKpYfyF.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\aHCzzFh.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\NzqnhRl.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\edpMAwN.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\XaHGtPv.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\kmHsZQu.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\weeCyat.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\IzcIvyX.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\rYtYYNl.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\yPttjij.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe File created C:\Windows\System\FGnikQd.exe 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exedescription pid process Token: SeLockMemoryPrivilege 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe Token: SeLockMemoryPrivilege 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exedescription pid process target process PID 2980 wrote to memory of 2792 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe mlafako.exe PID 2980 wrote to memory of 2792 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe mlafako.exe PID 2980 wrote to memory of 2792 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe mlafako.exe PID 2980 wrote to memory of 2916 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe WiRZcUB.exe PID 2980 wrote to memory of 2916 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe WiRZcUB.exe PID 2980 wrote to memory of 2916 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe WiRZcUB.exe PID 2980 wrote to memory of 2392 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe HhrqXzq.exe PID 2980 wrote to memory of 2392 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe HhrqXzq.exe PID 2980 wrote to memory of 2392 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe HhrqXzq.exe PID 2980 wrote to memory of 2100 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe hRggsSl.exe PID 2980 wrote to memory of 2100 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe hRggsSl.exe PID 2980 wrote to memory of 2100 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe hRggsSl.exe PID 2980 wrote to memory of 2720 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe pbChuyt.exe PID 2980 wrote to memory of 2720 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe pbChuyt.exe PID 2980 wrote to memory of 2720 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe pbChuyt.exe PID 2980 wrote to memory of 2744 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe WbcAllU.exe PID 2980 wrote to memory of 2744 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe WbcAllU.exe PID 2980 wrote to memory of 2744 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe WbcAllU.exe PID 2980 wrote to memory of 2644 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe oWxgjXU.exe PID 2980 wrote to memory of 2644 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe oWxgjXU.exe PID 2980 wrote to memory of 2644 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe oWxgjXU.exe PID 2980 wrote to memory of 2924 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe gsjGcpC.exe PID 2980 wrote to memory of 2924 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe gsjGcpC.exe PID 2980 wrote to memory of 2924 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe gsjGcpC.exe PID 2980 wrote to memory of 2764 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe fQCCHDq.exe PID 2980 wrote to memory of 2764 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe fQCCHDq.exe PID 2980 wrote to memory of 2764 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe fQCCHDq.exe PID 2980 wrote to memory of 2752 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe xNGrCmf.exe PID 2980 wrote to memory of 2752 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe xNGrCmf.exe PID 2980 wrote to memory of 2752 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe xNGrCmf.exe PID 2980 wrote to memory of 2656 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe GJqkDNU.exe PID 2980 wrote to memory of 2656 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe GJqkDNU.exe PID 2980 wrote to memory of 2656 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe GJqkDNU.exe PID 2980 wrote to memory of 2568 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe KdpidcT.exe PID 2980 wrote to memory of 2568 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe KdpidcT.exe PID 2980 wrote to memory of 2568 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe KdpidcT.exe PID 2980 wrote to memory of 2524 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe OKcwkcm.exe PID 2980 wrote to memory of 2524 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe OKcwkcm.exe PID 2980 wrote to memory of 2524 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe OKcwkcm.exe PID 2980 wrote to memory of 2564 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe QGxZnEI.exe PID 2980 wrote to memory of 2564 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe QGxZnEI.exe PID 2980 wrote to memory of 2564 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe QGxZnEI.exe PID 2980 wrote to memory of 3024 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe fmlsUaN.exe PID 2980 wrote to memory of 3024 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe fmlsUaN.exe PID 2980 wrote to memory of 3024 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe fmlsUaN.exe PID 2980 wrote to memory of 2780 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe esdSSwm.exe PID 2980 wrote to memory of 2780 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe esdSSwm.exe PID 2980 wrote to memory of 2780 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe esdSSwm.exe PID 2980 wrote to memory of 1292 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe ugUDLlN.exe PID 2980 wrote to memory of 1292 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe ugUDLlN.exe PID 2980 wrote to memory of 1292 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe ugUDLlN.exe PID 2980 wrote to memory of 2800 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe jFZaPtJ.exe PID 2980 wrote to memory of 2800 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe jFZaPtJ.exe PID 2980 wrote to memory of 2800 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe jFZaPtJ.exe PID 2980 wrote to memory of 2860 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe mRkXGeX.exe PID 2980 wrote to memory of 2860 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe mRkXGeX.exe PID 2980 wrote to memory of 2860 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe mRkXGeX.exe PID 2980 wrote to memory of 2908 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe HyYpXXN.exe PID 2980 wrote to memory of 2908 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe HyYpXXN.exe PID 2980 wrote to memory of 2908 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe HyYpXXN.exe PID 2980 wrote to memory of 3036 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe TeUSmqI.exe PID 2980 wrote to memory of 3036 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe TeUSmqI.exe PID 2980 wrote to memory of 3036 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe TeUSmqI.exe PID 2980 wrote to memory of 2284 2980 813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe RXtfwUL.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\813be4ec38a695a2058343e26fb6c040_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\mlafako.exeC:\Windows\System\mlafako.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WiRZcUB.exeC:\Windows\System\WiRZcUB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HhrqXzq.exeC:\Windows\System\HhrqXzq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\hRggsSl.exeC:\Windows\System\hRggsSl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pbChuyt.exeC:\Windows\System\pbChuyt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WbcAllU.exeC:\Windows\System\WbcAllU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oWxgjXU.exeC:\Windows\System\oWxgjXU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gsjGcpC.exeC:\Windows\System\gsjGcpC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fQCCHDq.exeC:\Windows\System\fQCCHDq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xNGrCmf.exeC:\Windows\System\xNGrCmf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GJqkDNU.exeC:\Windows\System\GJqkDNU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KdpidcT.exeC:\Windows\System\KdpidcT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OKcwkcm.exeC:\Windows\System\OKcwkcm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QGxZnEI.exeC:\Windows\System\QGxZnEI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fmlsUaN.exeC:\Windows\System\fmlsUaN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\esdSSwm.exeC:\Windows\System\esdSSwm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ugUDLlN.exeC:\Windows\System\ugUDLlN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jFZaPtJ.exeC:\Windows\System\jFZaPtJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mRkXGeX.exeC:\Windows\System\mRkXGeX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HyYpXXN.exeC:\Windows\System\HyYpXXN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TeUSmqI.exeC:\Windows\System\TeUSmqI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RXtfwUL.exeC:\Windows\System\RXtfwUL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LzvHDqp.exeC:\Windows\System\LzvHDqp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IrFehUu.exeC:\Windows\System\IrFehUu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gfjBzfm.exeC:\Windows\System\gfjBzfm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JvNOnhI.exeC:\Windows\System\JvNOnhI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\AeQhKeW.exeC:\Windows\System\AeQhKeW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oVwoTho.exeC:\Windows\System\oVwoTho.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NhQZGlq.exeC:\Windows\System\NhQZGlq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yPttjij.exeC:\Windows\System\yPttjij.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QhFtYFv.exeC:\Windows\System\QhFtYFv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OstnEBS.exeC:\Windows\System\OstnEBS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lMyWxzg.exeC:\Windows\System\lMyWxzg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BAjHoTp.exeC:\Windows\System\BAjHoTp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wcPSxVX.exeC:\Windows\System\wcPSxVX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XaHGtPv.exeC:\Windows\System\XaHGtPv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\skhqxqt.exeC:\Windows\System\skhqxqt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TEdVIuR.exeC:\Windows\System\TEdVIuR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cvXzQZG.exeC:\Windows\System\cvXzQZG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LawOlQT.exeC:\Windows\System\LawOlQT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UyesvyC.exeC:\Windows\System\UyesvyC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lfdWRYx.exeC:\Windows\System\lfdWRYx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\deZAosz.exeC:\Windows\System\deZAosz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IyaSong.exeC:\Windows\System\IyaSong.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WxYudce.exeC:\Windows\System\WxYudce.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vQZFHnF.exeC:\Windows\System\vQZFHnF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rodEsWo.exeC:\Windows\System\rodEsWo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QwaOjpl.exeC:\Windows\System\QwaOjpl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EgtolwT.exeC:\Windows\System\EgtolwT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oKpuNRU.exeC:\Windows\System\oKpuNRU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iYbGDXh.exeC:\Windows\System\iYbGDXh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\eBNqAxi.exeC:\Windows\System\eBNqAxi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lYxCXlT.exeC:\Windows\System\lYxCXlT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bljCWEL.exeC:\Windows\System\bljCWEL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XLnmDuF.exeC:\Windows\System\XLnmDuF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DsQMwYe.exeC:\Windows\System\DsQMwYe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bHXNJDG.exeC:\Windows\System\bHXNJDG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bsYjTZD.exeC:\Windows\System\bsYjTZD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kmHsZQu.exeC:\Windows\System\kmHsZQu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sBMqsUF.exeC:\Windows\System\sBMqsUF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IEmIJfF.exeC:\Windows\System\IEmIJfF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lIKSiqK.exeC:\Windows\System\lIKSiqK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zkCiXRB.exeC:\Windows\System\zkCiXRB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bdvfzhU.exeC:\Windows\System\bdvfzhU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\weeCyat.exeC:\Windows\System\weeCyat.exe2⤵
-
C:\Windows\System\SpqZRGk.exeC:\Windows\System\SpqZRGk.exe2⤵
-
C:\Windows\System\ojYXBIc.exeC:\Windows\System\ojYXBIc.exe2⤵
-
C:\Windows\System\GWoUZoJ.exeC:\Windows\System\GWoUZoJ.exe2⤵
-
C:\Windows\System\ZMPmDsw.exeC:\Windows\System\ZMPmDsw.exe2⤵
-
C:\Windows\System\iQtWCKD.exeC:\Windows\System\iQtWCKD.exe2⤵
-
C:\Windows\System\Qlkyfyb.exeC:\Windows\System\Qlkyfyb.exe2⤵
-
C:\Windows\System\klAtxFW.exeC:\Windows\System\klAtxFW.exe2⤵
-
C:\Windows\System\NwKSDzo.exeC:\Windows\System\NwKSDzo.exe2⤵
-
C:\Windows\System\GlJSOHD.exeC:\Windows\System\GlJSOHD.exe2⤵
-
C:\Windows\System\iBDADTr.exeC:\Windows\System\iBDADTr.exe2⤵
-
C:\Windows\System\oixNRws.exeC:\Windows\System\oixNRws.exe2⤵
-
C:\Windows\System\YEJETNd.exeC:\Windows\System\YEJETNd.exe2⤵
-
C:\Windows\System\sddbjek.exeC:\Windows\System\sddbjek.exe2⤵
-
C:\Windows\System\peVhVcT.exeC:\Windows\System\peVhVcT.exe2⤵
-
C:\Windows\System\TZNdHDM.exeC:\Windows\System\TZNdHDM.exe2⤵
-
C:\Windows\System\hhfDjwA.exeC:\Windows\System\hhfDjwA.exe2⤵
-
C:\Windows\System\bZIoLYU.exeC:\Windows\System\bZIoLYU.exe2⤵
-
C:\Windows\System\gJJkoaf.exeC:\Windows\System\gJJkoaf.exe2⤵
-
C:\Windows\System\slamaAC.exeC:\Windows\System\slamaAC.exe2⤵
-
C:\Windows\System\rbrcNgP.exeC:\Windows\System\rbrcNgP.exe2⤵
-
C:\Windows\System\fUezJJJ.exeC:\Windows\System\fUezJJJ.exe2⤵
-
C:\Windows\System\dIrbjGv.exeC:\Windows\System\dIrbjGv.exe2⤵
-
C:\Windows\System\EhgfMpi.exeC:\Windows\System\EhgfMpi.exe2⤵
-
C:\Windows\System\MxPAoBf.exeC:\Windows\System\MxPAoBf.exe2⤵
-
C:\Windows\System\qNjcrQu.exeC:\Windows\System\qNjcrQu.exe2⤵
-
C:\Windows\System\kHkYSuG.exeC:\Windows\System\kHkYSuG.exe2⤵
-
C:\Windows\System\QQMyQAk.exeC:\Windows\System\QQMyQAk.exe2⤵
-
C:\Windows\System\TobOXTm.exeC:\Windows\System\TobOXTm.exe2⤵
-
C:\Windows\System\EjliwBV.exeC:\Windows\System\EjliwBV.exe2⤵
-
C:\Windows\System\DGRgVwg.exeC:\Windows\System\DGRgVwg.exe2⤵
-
C:\Windows\System\ChZDecM.exeC:\Windows\System\ChZDecM.exe2⤵
-
C:\Windows\System\PwPmTZz.exeC:\Windows\System\PwPmTZz.exe2⤵
-
C:\Windows\System\LWnJzda.exeC:\Windows\System\LWnJzda.exe2⤵
-
C:\Windows\System\uJNFhrg.exeC:\Windows\System\uJNFhrg.exe2⤵
-
C:\Windows\System\KmsDsJJ.exeC:\Windows\System\KmsDsJJ.exe2⤵
-
C:\Windows\System\QuOuXGZ.exeC:\Windows\System\QuOuXGZ.exe2⤵
-
C:\Windows\System\IzcIvyX.exeC:\Windows\System\IzcIvyX.exe2⤵
-
C:\Windows\System\HKpYfyF.exeC:\Windows\System\HKpYfyF.exe2⤵
-
C:\Windows\System\FGnikQd.exeC:\Windows\System\FGnikQd.exe2⤵
-
C:\Windows\System\wLlfrjE.exeC:\Windows\System\wLlfrjE.exe2⤵
-
C:\Windows\System\tJTIyfz.exeC:\Windows\System\tJTIyfz.exe2⤵
-
C:\Windows\System\YXVblIP.exeC:\Windows\System\YXVblIP.exe2⤵
-
C:\Windows\System\rYtYYNl.exeC:\Windows\System\rYtYYNl.exe2⤵
-
C:\Windows\System\SPHviuM.exeC:\Windows\System\SPHviuM.exe2⤵
-
C:\Windows\System\ZXkDTpB.exeC:\Windows\System\ZXkDTpB.exe2⤵
-
C:\Windows\System\CKyZHvp.exeC:\Windows\System\CKyZHvp.exe2⤵
-
C:\Windows\System\pHxKhiw.exeC:\Windows\System\pHxKhiw.exe2⤵
-
C:\Windows\System\UwuJeCM.exeC:\Windows\System\UwuJeCM.exe2⤵
-
C:\Windows\System\uNnCDoK.exeC:\Windows\System\uNnCDoK.exe2⤵
-
C:\Windows\System\GvhkMTE.exeC:\Windows\System\GvhkMTE.exe2⤵
-
C:\Windows\System\fuzrAxM.exeC:\Windows\System\fuzrAxM.exe2⤵
-
C:\Windows\System\wuMTGxP.exeC:\Windows\System\wuMTGxP.exe2⤵
-
C:\Windows\System\NsFCVxH.exeC:\Windows\System\NsFCVxH.exe2⤵
-
C:\Windows\System\QIKhHwY.exeC:\Windows\System\QIKhHwY.exe2⤵
-
C:\Windows\System\UdhOSCl.exeC:\Windows\System\UdhOSCl.exe2⤵
-
C:\Windows\System\dZeqRJn.exeC:\Windows\System\dZeqRJn.exe2⤵
-
C:\Windows\System\fsGUrqf.exeC:\Windows\System\fsGUrqf.exe2⤵
-
C:\Windows\System\slDfZqM.exeC:\Windows\System\slDfZqM.exe2⤵
-
C:\Windows\System\irnnkMJ.exeC:\Windows\System\irnnkMJ.exe2⤵
-
C:\Windows\System\sGrrceI.exeC:\Windows\System\sGrrceI.exe2⤵
-
C:\Windows\System\KsFBXDt.exeC:\Windows\System\KsFBXDt.exe2⤵
-
C:\Windows\System\HeziKfs.exeC:\Windows\System\HeziKfs.exe2⤵
-
C:\Windows\System\LHfQFjL.exeC:\Windows\System\LHfQFjL.exe2⤵
-
C:\Windows\System\LAYKxvb.exeC:\Windows\System\LAYKxvb.exe2⤵
-
C:\Windows\System\efwCfgh.exeC:\Windows\System\efwCfgh.exe2⤵
-
C:\Windows\System\bGwIURr.exeC:\Windows\System\bGwIURr.exe2⤵
-
C:\Windows\System\ZMbnhhG.exeC:\Windows\System\ZMbnhhG.exe2⤵
-
C:\Windows\System\hPBPCzx.exeC:\Windows\System\hPBPCzx.exe2⤵
-
C:\Windows\System\TldanyX.exeC:\Windows\System\TldanyX.exe2⤵
-
C:\Windows\System\JZNlusf.exeC:\Windows\System\JZNlusf.exe2⤵
-
C:\Windows\System\bNtnmGP.exeC:\Windows\System\bNtnmGP.exe2⤵
-
C:\Windows\System\UhrUqNu.exeC:\Windows\System\UhrUqNu.exe2⤵
-
C:\Windows\System\REnIPsi.exeC:\Windows\System\REnIPsi.exe2⤵
-
C:\Windows\System\QEcTUhp.exeC:\Windows\System\QEcTUhp.exe2⤵
-
C:\Windows\System\akiXYkF.exeC:\Windows\System\akiXYkF.exe2⤵
-
C:\Windows\System\yROGfcf.exeC:\Windows\System\yROGfcf.exe2⤵
-
C:\Windows\System\MwrfiGQ.exeC:\Windows\System\MwrfiGQ.exe2⤵
-
C:\Windows\System\xHUgilK.exeC:\Windows\System\xHUgilK.exe2⤵
-
C:\Windows\System\UpEQxmd.exeC:\Windows\System\UpEQxmd.exe2⤵
-
C:\Windows\System\FgVdmSj.exeC:\Windows\System\FgVdmSj.exe2⤵
-
C:\Windows\System\nvUnbfa.exeC:\Windows\System\nvUnbfa.exe2⤵
-
C:\Windows\System\hEVgnra.exeC:\Windows\System\hEVgnra.exe2⤵
-
C:\Windows\System\OhKHLIq.exeC:\Windows\System\OhKHLIq.exe2⤵
-
C:\Windows\System\tCWRtbz.exeC:\Windows\System\tCWRtbz.exe2⤵
-
C:\Windows\System\BetMOqn.exeC:\Windows\System\BetMOqn.exe2⤵
-
C:\Windows\System\QJkQrZi.exeC:\Windows\System\QJkQrZi.exe2⤵
-
C:\Windows\System\LJvbUDA.exeC:\Windows\System\LJvbUDA.exe2⤵
-
C:\Windows\System\qLlEPEU.exeC:\Windows\System\qLlEPEU.exe2⤵
-
C:\Windows\System\PhwVPYO.exeC:\Windows\System\PhwVPYO.exe2⤵
-
C:\Windows\System\EAMPyvh.exeC:\Windows\System\EAMPyvh.exe2⤵
-
C:\Windows\System\dXaCMJA.exeC:\Windows\System\dXaCMJA.exe2⤵
-
C:\Windows\System\FmKapfs.exeC:\Windows\System\FmKapfs.exe2⤵
-
C:\Windows\System\PrTIzzQ.exeC:\Windows\System\PrTIzzQ.exe2⤵
-
C:\Windows\System\EiPwlJA.exeC:\Windows\System\EiPwlJA.exe2⤵
-
C:\Windows\System\NgxYVYk.exeC:\Windows\System\NgxYVYk.exe2⤵
-
C:\Windows\System\XsKTXlb.exeC:\Windows\System\XsKTXlb.exe2⤵
-
C:\Windows\System\EMzvIkG.exeC:\Windows\System\EMzvIkG.exe2⤵
-
C:\Windows\System\LocDjsG.exeC:\Windows\System\LocDjsG.exe2⤵
-
C:\Windows\System\RyAHeJQ.exeC:\Windows\System\RyAHeJQ.exe2⤵
-
C:\Windows\System\Pvofmzj.exeC:\Windows\System\Pvofmzj.exe2⤵
-
C:\Windows\System\OLMUdBJ.exeC:\Windows\System\OLMUdBJ.exe2⤵
-
C:\Windows\System\WWuqyAF.exeC:\Windows\System\WWuqyAF.exe2⤵
-
C:\Windows\System\eFiSQVC.exeC:\Windows\System\eFiSQVC.exe2⤵
-
C:\Windows\System\WwhLZTq.exeC:\Windows\System\WwhLZTq.exe2⤵
-
C:\Windows\System\QJdmjTy.exeC:\Windows\System\QJdmjTy.exe2⤵
-
C:\Windows\System\aHCzzFh.exeC:\Windows\System\aHCzzFh.exe2⤵
-
C:\Windows\System\UOVFLhG.exeC:\Windows\System\UOVFLhG.exe2⤵
-
C:\Windows\System\NzqnhRl.exeC:\Windows\System\NzqnhRl.exe2⤵
-
C:\Windows\System\hqdJNmM.exeC:\Windows\System\hqdJNmM.exe2⤵
-
C:\Windows\System\epSFdPJ.exeC:\Windows\System\epSFdPJ.exe2⤵
-
C:\Windows\System\FAhlrQu.exeC:\Windows\System\FAhlrQu.exe2⤵
-
C:\Windows\System\YJtHeLC.exeC:\Windows\System\YJtHeLC.exe2⤵
-
C:\Windows\System\wDwuLsT.exeC:\Windows\System\wDwuLsT.exe2⤵
-
C:\Windows\System\tVIHSkR.exeC:\Windows\System\tVIHSkR.exe2⤵
-
C:\Windows\System\CYcGcQX.exeC:\Windows\System\CYcGcQX.exe2⤵
-
C:\Windows\System\qSHlHiw.exeC:\Windows\System\qSHlHiw.exe2⤵
-
C:\Windows\System\IIlQDRv.exeC:\Windows\System\IIlQDRv.exe2⤵
-
C:\Windows\System\ZxSlHEK.exeC:\Windows\System\ZxSlHEK.exe2⤵
-
C:\Windows\System\tczIEMq.exeC:\Windows\System\tczIEMq.exe2⤵
-
C:\Windows\System\trDhQil.exeC:\Windows\System\trDhQil.exe2⤵
-
C:\Windows\System\XCrVUAU.exeC:\Windows\System\XCrVUAU.exe2⤵
-
C:\Windows\System\rDrJyNH.exeC:\Windows\System\rDrJyNH.exe2⤵
-
C:\Windows\System\NrMqUHK.exeC:\Windows\System\NrMqUHK.exe2⤵
-
C:\Windows\System\XLghFmJ.exeC:\Windows\System\XLghFmJ.exe2⤵
-
C:\Windows\System\zBznudv.exeC:\Windows\System\zBznudv.exe2⤵
-
C:\Windows\System\cFiKEnS.exeC:\Windows\System\cFiKEnS.exe2⤵
-
C:\Windows\System\iYIDVtE.exeC:\Windows\System\iYIDVtE.exe2⤵
-
C:\Windows\System\PvYgUrE.exeC:\Windows\System\PvYgUrE.exe2⤵
-
C:\Windows\System\VwSebLD.exeC:\Windows\System\VwSebLD.exe2⤵
-
C:\Windows\System\edpMAwN.exeC:\Windows\System\edpMAwN.exe2⤵
-
C:\Windows\System\dmPHxFf.exeC:\Windows\System\dmPHxFf.exe2⤵
-
C:\Windows\System\wdcPKGo.exeC:\Windows\System\wdcPKGo.exe2⤵
-
C:\Windows\System\KviTaAD.exeC:\Windows\System\KviTaAD.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\AeQhKeW.exeFilesize
1017KB
MD58f863b8febad89d405d38ab6f81d93b9
SHA10becc2e715ac2b94961947144fd93fcbbd08afb2
SHA256d26f9258ff149f64e3adb8fd12c21cd19bd5ae752a742a451447d53fff3ca239
SHA512081521bdd942f4c82cc432884f8bb188bccdd028fea33b8a6103bc4e3ba56a3f0306498516fdedd1b776ca672fac7e82b910a2ff4acb16aa5db768f1c5b86396
-
C:\Windows\system\GJqkDNU.exeFilesize
1013KB
MD52f7e493e2442f4e3d59eca851bc91372
SHA146e8936bc24517977f6f485671c317163d83c7cc
SHA2560139833fe58eb71cf7bda65d07375608d3911b2f7039c46c7b84c0e5676dc416
SHA5122c55e40460dd53979932c5f20993c6eb37e166c3da700361f3c85f68214db2b552429a250bea000417966a4a45c5a662d0cbfa2840ed401a517b0a74272d6e8b
-
C:\Windows\system\HhrqXzq.exeFilesize
1011KB
MD50d30337f917ecbaa74e10945cc9a00b9
SHA1f87831c0de0ed0d208e372614416d287f68344c7
SHA2568f1252ff4c793fafd1fe70ee54494b130bbb877a71b7828f356861f4c7e9108a
SHA512998d9f15d8fc67dab7ff7d3b415fb3f69a5d89879aa99949c546410ee75c5a06b3290c01eb909d6c7d04db478291602e5a53b96cefe3198c0c0d35e82fb3c9b4
-
C:\Windows\system\HyYpXXN.exeFilesize
1015KB
MD5fca7db1d13fe1e5edf96e7c5b1f81643
SHA14ac7b3900b6cef8e1efbd2b8fea93cdb04bece38
SHA256f602f16cbdd349ee9abc4370e188c01f176c95ce584bf8edddbc652e8b10cf20
SHA512eb9cc18bab91e63c3862d903a7309c33f650c6261e7c6c1909c809e6b29e82beeb86c8a367fab8fe16b5761085c9d3ae9d2c769a75e7b9e49b9783afade8adae
-
C:\Windows\system\IrFehUu.exeFilesize
1016KB
MD53fac3724904c4627d7c11252c76a0b89
SHA10b34042436f87b233323f87cf317657ffe660433
SHA256f55dd91e203b2eb3dd413d980671f4934e356d45712c3328546af159ccbad067
SHA512f1be74999615d2c527fc3ce6d5cf5ac3ce23cad70ccd760caa872f7fc4de1d108c4941bd581df5baa5cba7478446ae5e88be76399d07ca282c95d126ab0586df
-
C:\Windows\system\JvNOnhI.exeFilesize
1016KB
MD5bc5202394ce0a11b2dd148018118a4a1
SHA1eedb9197ba8ba056cb930ec28ff8c47562664b42
SHA256d7ba6fdd4f97c6ea1b43dd81c54f5dc7cf0caf23707c0b249d40b82825df2199
SHA51202f4b41d84d58eb52220ca137d98ea6a218f2c349284015fc8b54d9e987dd2cfe39e03a90e1bda3f9d4de79eb07e32119ba6d146ffb59b9ae1fb7dac3c409599
-
C:\Windows\system\KdpidcT.exeFilesize
1013KB
MD5b281bd50e2079b334b36ee05b36daf40
SHA1d366572468b521c1575c84bd9203d3e993fef931
SHA256b03edefd4f68a3bf37ae409553261efc6afd8a9e0171fb50df129d37b9306754
SHA512d3ce349b474078f86e04c81904b8677488cf5670c782391caf5d49c43a58b164c7622874f6eb5fc64eda44cceda10adabc27b480ba29529ce777171614225470
-
C:\Windows\system\LzvHDqp.exeFilesize
1016KB
MD57561731fda3ee0b1e6040b5eda055f33
SHA131465491981a3126892aaca25f5414bb4cdec100
SHA256a5f4eb65efe34c61eee9a75b68a7080785a0dd7e2381b7df97270e8930d66418
SHA512d1e94623cfbece926e9ab0b58861856c45ce2cabc5b5fd6a844badd0d82344b267474686bec882d177200abd47f8662fd18d376660c87cfe8167e783af41c6be
-
C:\Windows\system\NhQZGlq.exeFilesize
1017KB
MD568c7ed7605b1fe1fb9a48727c3383a64
SHA1824c301bdfd19273196217191feaa391b7739cff
SHA2564d3a40c422e1b3ffebf18d2f03d9b1e8e020e7015baa1926ea211d5d0b1f52c9
SHA51216d7c57b688f1bf327afa7be09b07df56c0e4fa2030840f650f7734e0cfa3fd2feede4f221e5db8d18834e0a64072ae676af77e3d3788a1a5ed9fadce6f8a236
-
C:\Windows\system\OKcwkcm.exeFilesize
1013KB
MD52f52724734de660c1d78ee14267c11b2
SHA11d8a966f2ec263f8d01810a93bb9102fa560d414
SHA256bacc2239759834c4adeb1f972e9d22659ab6e4988bce35f7434106a5b49567c9
SHA51287ede00d64dcf797f85f86ec969f574e58f756f8c97a8ca24d799bdd5dfa8c8233835a11fc8c527111078de8360ec7039354731dfb027910b271e75f01381876
-
C:\Windows\system\OstnEBS.exeFilesize
1018KB
MD5a3f8787feef4e883659f2459f2d73f30
SHA163f7a536c2371a62253cb96be0c780d9126ae378
SHA256babb304c39f44a99b538252de244919b19c44c8e6cbbafcca5384991e95477a7
SHA512a801800bed66f413323295346f1f62d2cfc8d85b531b0c0cdc10c42f593dfdec19a9de5e98902526e7977792ddefd1eb25fc9848db64dd155f108d565559defb
-
C:\Windows\system\QGxZnEI.exeFilesize
1013KB
MD577124451cdc39ca72f59c488f84d291f
SHA115b718ebffb90b4c14782525888764b6e660dcc4
SHA25610e5bea6e4bda7d5062a2ff788352c719eda7548b7f5c1a81fbb961ca8311e1f
SHA512aaee2b3a3bd4eb953361f12e1986dc4f1628cae2b03e9d4c7ba6f6be67515c9bd7380d0c8163050a6fc55b6b8d6f96ee4365615b5f4dc9679a27ae3fca46a550
-
C:\Windows\system\QhFtYFv.exeFilesize
1018KB
MD51f54bd4b8f0187e9ea0d6f2c6d9386ee
SHA1f6c061990a88daa8d27e0f619a6c61d0b68c2888
SHA2562f36cf14dc09fbe97d5f0ff48a5be4b275bb5decceb800b50ec49820037cec75
SHA512f51d15079c4caac5e2c59480eb3226b5d9f45613108d2f2870ad34670b521a59c04d23e4bba20575fe212a93b86bedbbf2d57f93f62842b003c1ae5870eca9e3
-
C:\Windows\system\RXtfwUL.exeFilesize
1015KB
MD5025a763194b74ea07f9125477f14626b
SHA132fa970647853545d8d227821b201d8cad871d1c
SHA25635230b793e6ff3c44b1a5d95bd99814bf3f251ac7c166706e98d66578405edb8
SHA512afd661a90431b5373095607190fb65a8cf001eec4281e1d2f7d29936857df1e97620b33a3eb90abfcd4111f3680673ef94860609ad567aa299117c89e1767c24
-
C:\Windows\system\TeUSmqI.exeFilesize
1015KB
MD5614794e62d429fd361805fff57b97272
SHA16554e2bad7372a4763421d74377230e99361ba24
SHA256c417cc526eeeadc89c93dfc56e8095173d538cd9b954238ecb2946cd5b562d35
SHA51299c5b4726aa2ef3bc1cadc20b3df092eb907288d34763a7193119728ba0623e92673c8bed661b68dc557fec64e30fb0b214a16a61dd84a57f520c0d37df59f64
-
C:\Windows\system\WbcAllU.exeFilesize
1011KB
MD57d37783078b07883135ba0a911fee20a
SHA197ba9a699cf71642a932a35b2c5d6e838f419724
SHA2567d173053875a434dd76c6579b6e7c2361dc1ed150a5a2e45935d5420978f9809
SHA512c99cf28e03d9554a6d99a5a6a88e2f20d1e7a2c76c64c6d0030c112c18d1a7ac4bfb4796df63ca9a107ab8894793de4919b4fa7ab4ecf3f6dd06ba9481debcc0
-
C:\Windows\system\esdSSwm.exeFilesize
1014KB
MD516d6aea703c5c0a04cfc450eebb5546b
SHA1f3c0d41767807a2899f81fbaeb6b7c1f65848de7
SHA2561a6824fdd7b1e47a5981d53f9c88b8add0c18c52006c089b4390a63dcbe9a74e
SHA5121c19b945b8b1df66dbda6f37d7c4c2aee3f4c592b2351738f23b8084e7ac46a929eea9e8d5db56a552023690bcb68792a3070554e7fe6e1d1c798bca9f625493
-
C:\Windows\system\fQCCHDq.exeFilesize
1012KB
MD5712c34b6131c8abb19efa5515bef565b
SHA132e2196cf22c383ffdb61f35f1cfcd61a0376afe
SHA256fb927d6e4701ab57d0e7a14b749f1e98b410effc69c8bcb03b8d96c302210e8d
SHA51254a5018f48bef1dd671eba46efe4d326315d31c398dd6f9108b8d5fc3d2749be666f44f7321d03bfcb7c13d39dea07794471c6d219e54178181692130475f26a
-
C:\Windows\system\fmlsUaN.exeFilesize
1014KB
MD571cc1eb365802190d454b374f97812e4
SHA17ae141e8c66dc330e124518e74a3c245fb58cdc8
SHA256daadc04087f89bfd7c6726b1c9563a22070cd996333057bf504f5db470f0a965
SHA51233c3f6a01dad86663b97016a3ae55e92ef73d336c90aa3e6d51b434e6d2b257aa4f732f0e0db6f98ffe8fad3db51d9fb1af475599c7463fecaeaab5f852fc830
-
C:\Windows\system\gfjBzfm.exeFilesize
1016KB
MD5862f355d753d28efb6d6eadab367ea48
SHA1f00a56df6de1e51929c939677eaae8f8a82fcbc6
SHA256bd3bf8d98f8adeb06ef4977f5d73c4d737a5f3cd306082e01bc52c61ae3b57a4
SHA5127af68ebbcacbe39d911f31ab39c2c9ee9cdb0d5497af45ada48fe755817c992270990a5afe0a09da4bd972d670a26fef47d8683695196e1d4daf985b916e59e8
-
C:\Windows\system\gsjGcpC.exeFilesize
1012KB
MD5f152ee210ec50a3756ab3c5e549d51e1
SHA1b4d58d27f91fa4fa338c24fd2c80bbb173457aac
SHA2563b191b3be557cbdf2a29bf01afc9e171e020da419c404bbe74c2c498a9d406ed
SHA5129ce90e19f98bd84a9c808e6a531615ac6fc876399459c674132a1a9433961cb9453d476a6854d191bd92d4a7cbc36cc3c329ddeda15f13cb0236753858f26dbd
-
C:\Windows\system\hRggsSl.exeFilesize
1011KB
MD5cd96e49b535775d564d1c4f82e22afc6
SHA170d15c7d411e6f73ff1f31b713898b759e6c423b
SHA25612bde4ccb7982cd739a7fded292f629904daa2a34e38a691e939457f22a28784
SHA51272336189f3fd9788fd8997ff9d52d8b7727603e3be777a27e1d702fe56124e1182e59aefed03feadd1d235039c5a688912e072815a93a748f924372c9ccf4f52
-
C:\Windows\system\jFZaPtJ.exeFilesize
1014KB
MD5d35ddc5420ad7b47e375c18abc1386b9
SHA1735b5eb172b6e41615f59acb5956c5565bfc0aaf
SHA2563aba43abc246a4a3933ce728a10a01302722984657d913975d9d5aa4a028280e
SHA51202224295011a2c750190446511c4b8096a30e52dadda334e397189fa15891065024fe7fb3c3c952ebad872f93f68441a6101492d2371a580a50a29359d4518b4
-
C:\Windows\system\mRkXGeX.exeFilesize
1015KB
MD52274558424aa8e43c0bae3c0a4120bbc
SHA167d8e89aeae777e072e857625500de495e076c5c
SHA256f29ce7a82bca371e354201c4c6bd4c78703f95da1c4d38dcf0538c18ad3611a5
SHA5124ca1a69bb356483f615808ef59e07053cb74f7cd96a74f35905ea99b901de5a3adc12a4dbaa2112322bc704b5bc3002f23b41ab6edb0ed369403ba98335d5318
-
C:\Windows\system\oVwoTho.exeFilesize
1017KB
MD5f1dba0cbb6ebd952b1e9ae79ada2b69f
SHA195b5c6fe484015d09d09cfdc238a4c5a67336c20
SHA2568183eb528c477ed3b5d5f3907972e2d705ac5c499f8321eb5674c8cd23c65cc6
SHA512266238b16c624a5a34d00dbac2f55e0be026932c1f09577d9d2a1e27eef31932473780841ce63fba1a80d9162ee1008ee018704ec94e3ab6bccec67bbf0fc7a3
-
C:\Windows\system\oWxgjXU.exeFilesize
1012KB
MD5cb028e00adb8472532ec04e2f50ff6bf
SHA1830e062cc67bb9d5a531d9aac58208590832b725
SHA2569b3dc462101b55da70f405567f8c67fe66fcda25ea2e6fadd5695b58476164d9
SHA5120ba34d118fd8b693a09ea8e730c69b53617fdb0612bc43c0285638f2e8acadb00553300042be486c87f3db6e1890f9097cc733557dbeebb27f873507892f74fe
-
C:\Windows\system\pbChuyt.exeFilesize
1011KB
MD5a5026887576e705a1fde24a83d38dcd9
SHA1bb31fcf98beefa6276deb4e43a4b936e54d32847
SHA25663f2bcaf85b3523c23300ba0e2c4e2e252fcd2bddc0212daec6fb6b8e2ad9acb
SHA5128b6e7aeda72a2363722127bdb48ddb0c1c556e08bd04fd4ca817ff8481424f3a5f66629ca03606ccf2becc8f72cadade9c5d79873d73cece680d84b5eb360340
-
C:\Windows\system\ugUDLlN.exeFilesize
1014KB
MD571df2c214ca8f3ceee20a29cfc1c84e8
SHA105c9ae55af9cbb928913f4c7f7fbb270442db263
SHA2568c64226458a690f9be66d303914d9613b287bffc8cae631b4b593653783f1a2f
SHA51218d094fee848b4a3779468aeb490fecfc44c696f3a84b834e9e36a900932765d05bec9297730ffdbf8424a3bbdd65553ffdc2e6cae983e466d782a36c693f016
-
C:\Windows\system\yPttjij.exeFilesize
1017KB
MD57c29222e5cfe8b404e04eb16b7ee66eb
SHA1555a1a1b381887f676c2cddd0a8785b4ba74ef00
SHA2563975a0c75553c24dcf475127d465d0d7acbca515126334bb6eb408f35cd71bd6
SHA512b91909e36da839517624433842853589e0770a66936d2fbf62a9eb0823f6275c2153c8d81677b929823384e6bb40e1ef89d8ce22e95c750fee6a8e6b7bbe52ad
-
\Windows\system\WiRZcUB.exeFilesize
1010KB
MD53e71c871df3be9318236060906498f93
SHA1596dcf2399b68b9c7c120f5fa546daf0e1111d1e
SHA25687bb660cdc9d978dd5c3cb6a49b9098b7e9a500e870534b2e02181c7fa4c1d62
SHA512402285b6c9d3ac86b1c895514d73b7a17efb54cc33378c0e7f257f3abc6188d0d949bf085c79a597ceb8b8c8aa7558c824ccd4c14a3c8f700bd79ddaebffa606
-
\Windows\system\mlafako.exeFilesize
1010KB
MD553ed48bd524291425c6a1649dfda706f
SHA1b55d35acee4e17ae4398659ac928424c609b299b
SHA256765b6ec370696f807a73d900e516f7a18c132ea53bf8b393b5027bad946cabe7
SHA512b2554f6228851ea1781abe55356f24c876f07ce0589a2b7753e104c962dcaca46e58fd29a84e079361a2af7673880e4e5d3ad141edb7d2c1f87df7d507ac2260
-
\Windows\system\xNGrCmf.exeFilesize
1012KB
MD55356e4d22383d281327428a5eafb4754
SHA1d8575ee3b46ac26b280656b6e7bbef889dd2a934
SHA25692f84fcbb08dd2f99c09108f603af9396f62c7dda71591c95679c95381d85893
SHA51243325fdeebf9f88f9cc30e8436dba071b0ece02b5ac3069b7055378977d307bcb8e33caa72d89fd808e657944878cde0e6d147a8866a7e6af48fd60f1064a4db
-
memory/2980-0-0x0000000000200000-0x0000000000210000-memory.dmpFilesize
64KB