Analysis
-
max time kernel
75s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 13:41
Behavioral task
behavioral1
Sample
80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe
-
Size
1.6MB
-
MD5
80dc2d7acd231de40f111d1119717ed0
-
SHA1
7dc12c36964111ea14e73a12ddae54725d05bf97
-
SHA256
32ab93d8257de76a0c13557b37c15b30ea46e9cb36b0fdd583abb568c4cb9666
-
SHA512
b7c3908e9b5ebb04a8e413019ba2476309e5525c84bb5a2317aacecd56044088b87d531744fe86eeb43c06185027c327d89d2ce06ca820a56a1a393f9706df91
-
SSDEEP
24576:zv3/fTLF671TilQFG4P5PMkUCCWvLEvjuJoz5XdUK6S1uBkJdyFPNZmfsCJgio:Lz071uv4BPMkHC0I6Gz3N1p3EZmEagt
Malware Config
Signatures
-
XMRig Miner payload 47 IoCs
Processes:
resource yara_rule behavioral2/memory/4856-76-0x00007FF777C70000-0x00007FF778062000-memory.dmp xmrig behavioral2/memory/2016-368-0x00007FF6289F0000-0x00007FF628DE2000-memory.dmp xmrig behavioral2/memory/3160-371-0x00007FF7261D0000-0x00007FF7265C2000-memory.dmp xmrig behavioral2/memory/2948-373-0x00007FF674EC0000-0x00007FF6752B2000-memory.dmp xmrig behavioral2/memory/2960-374-0x00007FF63A600000-0x00007FF63A9F2000-memory.dmp xmrig behavioral2/memory/1928-372-0x00007FF79CB60000-0x00007FF79CF52000-memory.dmp xmrig behavioral2/memory/1948-370-0x00007FF780B30000-0x00007FF780F22000-memory.dmp xmrig behavioral2/memory/960-375-0x00007FF721660000-0x00007FF721A52000-memory.dmp xmrig behavioral2/memory/1976-75-0x00007FF731BA0000-0x00007FF731F92000-memory.dmp xmrig behavioral2/memory/3428-33-0x00007FF6D5EE0000-0x00007FF6D62D2000-memory.dmp xmrig behavioral2/memory/4404-22-0x00007FF67D820000-0x00007FF67DC12000-memory.dmp xmrig behavioral2/memory/2956-377-0x00007FF7BD750000-0x00007FF7BDB42000-memory.dmp xmrig behavioral2/memory/60-376-0x00007FF78DE10000-0x00007FF78E202000-memory.dmp xmrig behavioral2/memory/2664-379-0x00007FF6B0EE0000-0x00007FF6B12D2000-memory.dmp xmrig behavioral2/memory/788-380-0x00007FF7E2220000-0x00007FF7E2612000-memory.dmp xmrig behavioral2/memory/4880-381-0x00007FF713260000-0x00007FF713652000-memory.dmp xmrig behavioral2/memory/1444-382-0x00007FF7AA510000-0x00007FF7AA902000-memory.dmp xmrig behavioral2/memory/3920-384-0x00007FF786360000-0x00007FF786752000-memory.dmp xmrig behavioral2/memory/4716-385-0x00007FF6B1220000-0x00007FF6B1612000-memory.dmp xmrig behavioral2/memory/3316-386-0x00007FF79BBB0000-0x00007FF79BFA2000-memory.dmp xmrig behavioral2/memory/3756-383-0x00007FF717650000-0x00007FF717A42000-memory.dmp xmrig behavioral2/memory/3724-378-0x00007FF64DD60000-0x00007FF64E152000-memory.dmp xmrig behavioral2/memory/4184-3465-0x00007FF6D1800000-0x00007FF6D1BF2000-memory.dmp xmrig behavioral2/memory/3700-3625-0x00007FF6FF220000-0x00007FF6FF612000-memory.dmp xmrig behavioral2/memory/4404-3624-0x00007FF67D820000-0x00007FF67DC12000-memory.dmp xmrig behavioral2/memory/1976-3628-0x00007FF731BA0000-0x00007FF731F92000-memory.dmp xmrig behavioral2/memory/3428-3629-0x00007FF6D5EE0000-0x00007FF6D62D2000-memory.dmp xmrig behavioral2/memory/4856-3631-0x00007FF777C70000-0x00007FF778062000-memory.dmp xmrig behavioral2/memory/4716-3637-0x00007FF6B1220000-0x00007FF6B1612000-memory.dmp xmrig behavioral2/memory/4184-3639-0x00007FF6D1800000-0x00007FF6D1BF2000-memory.dmp xmrig behavioral2/memory/3920-3643-0x00007FF786360000-0x00007FF786752000-memory.dmp xmrig behavioral2/memory/3160-3642-0x00007FF7261D0000-0x00007FF7265C2000-memory.dmp xmrig behavioral2/memory/2016-3635-0x00007FF6289F0000-0x00007FF628DE2000-memory.dmp xmrig behavioral2/memory/1948-3634-0x00007FF780B30000-0x00007FF780F22000-memory.dmp xmrig behavioral2/memory/1928-3671-0x00007FF79CB60000-0x00007FF79CF52000-memory.dmp xmrig behavioral2/memory/3316-3673-0x00007FF79BBB0000-0x00007FF79BFA2000-memory.dmp xmrig behavioral2/memory/2948-3675-0x00007FF674EC0000-0x00007FF6752B2000-memory.dmp xmrig behavioral2/memory/60-3681-0x00007FF78DE10000-0x00007FF78E202000-memory.dmp xmrig behavioral2/memory/2956-3683-0x00007FF7BD750000-0x00007FF7BDB42000-memory.dmp xmrig behavioral2/memory/788-3699-0x00007FF7E2220000-0x00007FF7E2612000-memory.dmp xmrig behavioral2/memory/2664-3687-0x00007FF6B0EE0000-0x00007FF6B12D2000-memory.dmp xmrig behavioral2/memory/1444-3702-0x00007FF7AA510000-0x00007FF7AA902000-memory.dmp xmrig behavioral2/memory/3756-3705-0x00007FF717650000-0x00007FF717A42000-memory.dmp xmrig behavioral2/memory/4880-3703-0x00007FF713260000-0x00007FF713652000-memory.dmp xmrig behavioral2/memory/3724-3685-0x00007FF64DD60000-0x00007FF64E152000-memory.dmp xmrig behavioral2/memory/960-3679-0x00007FF721660000-0x00007FF721A52000-memory.dmp xmrig behavioral2/memory/2960-3677-0x00007FF63A600000-0x00007FF63A9F2000-memory.dmp xmrig -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 3 5000 powershell.exe 5 5000 powershell.exe -
Modifies Installed Components in the registry 2 TTPs 10 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 64 IoCs
Processes:
xPvWnKI.exezjvilka.exePtHygGf.exeVSsDrNE.exezaiqPaj.exeCgNEims.exeapclgLI.exembFMNHX.exeftUyhaz.exetYQDfah.exejzIopth.exepEmheoo.exeaTwTwnd.exehiotGkt.exeokpqglc.exeHwmblCG.exeXQTtzST.exelFbNZEF.exesFVTSRL.exefTTgQna.exeRdEdqzy.exevXzWkaT.exelTfPfop.exeQjGQrCH.exeIPOwzGT.exeRCUfeaX.exertfeKkF.execcVncHe.exezYhdmZi.exeYrINZoJ.exeSUoppDE.exevKdbnhm.exelaaHjvu.exegQlUVPj.exeOMBnxmd.exexJHTMEJ.exeTsWltXN.exegFxlOlJ.exebedNttN.exeHhrsQFg.exeyFtKeCC.exerQiDVIk.exeNpkKkbu.exeMRBjkBv.exejnuIJSX.exeEXQlSZf.exejcDXVsw.exeuGvJajE.exeOxhTLtW.exeqYytScm.exeKakYBPF.exedBaWaQc.exeSoCpjhw.exelJmEeHE.exedDGAroB.exeGnVOqoL.exeEjKcJGv.exepOofyuB.exeqGzoPqC.exeJlTQbtj.exeWdQJwgb.exeeeRPtTj.exeCdcTbzd.exedioDzCg.exepid process 3700 xPvWnKI.exe 4404 zjvilka.exe 1976 PtHygGf.exe 3428 VSsDrNE.exe 4856 zaiqPaj.exe 4184 CgNEims.exe 2016 apclgLI.exe 3920 mbFMNHX.exe 4716 ftUyhaz.exe 1948 tYQDfah.exe 3160 jzIopth.exe 1928 pEmheoo.exe 3316 aTwTwnd.exe 2948 hiotGkt.exe 2960 okpqglc.exe 960 HwmblCG.exe 60 XQTtzST.exe 2956 lFbNZEF.exe 3724 sFVTSRL.exe 2664 fTTgQna.exe 788 RdEdqzy.exe 4880 vXzWkaT.exe 1444 lTfPfop.exe 3756 QjGQrCH.exe 2304 IPOwzGT.exe 3596 RCUfeaX.exe 3936 rtfeKkF.exe 3912 ccVncHe.exe 2464 zYhdmZi.exe 2220 YrINZoJ.exe 2700 SUoppDE.exe 4832 vKdbnhm.exe 3476 laaHjvu.exe 4548 gQlUVPj.exe 2988 OMBnxmd.exe 2916 xJHTMEJ.exe 2528 TsWltXN.exe 3808 gFxlOlJ.exe 4748 bedNttN.exe 3184 HhrsQFg.exe 2708 yFtKeCC.exe 4624 rQiDVIk.exe 2272 NpkKkbu.exe 1112 MRBjkBv.exe 5104 jnuIJSX.exe 4900 EXQlSZf.exe 3568 jcDXVsw.exe 4104 uGvJajE.exe 1516 OxhTLtW.exe 696 qYytScm.exe 3636 KakYBPF.exe 1700 dBaWaQc.exe 2228 SoCpjhw.exe 3468 lJmEeHE.exe 848 dDGAroB.exe 2060 GnVOqoL.exe 5044 EjKcJGv.exe 684 pOofyuB.exe 5148 qGzoPqC.exe 5176 JlTQbtj.exe 5204 WdQJwgb.exe 5228 eeRPtTj.exe 5256 CdcTbzd.exe 5288 dioDzCg.exe -
Processes:
resource yara_rule behavioral2/memory/4108-0-0x00007FF74F010000-0x00007FF74F402000-memory.dmp upx C:\Windows\System\PtHygGf.exe upx C:\Windows\System\xPvWnKI.exe upx C:\Windows\System\VSsDrNE.exe upx C:\Windows\System\zaiqPaj.exe upx C:\Windows\System\CgNEims.exe upx C:\Windows\System\apclgLI.exe upx C:\Windows\System\mbFMNHX.exe upx C:\Windows\System\ftUyhaz.exe upx C:\Windows\System\jzIopth.exe upx behavioral2/memory/4856-76-0x00007FF777C70000-0x00007FF778062000-memory.dmp upx C:\Windows\System\HwmblCG.exe upx C:\Windows\System\lFbNZEF.exe upx C:\Windows\System\fTTgQna.exe upx C:\Windows\System\lTfPfop.exe upx C:\Windows\System\RCUfeaX.exe upx C:\Windows\System\zYhdmZi.exe upx C:\Windows\System\YrINZoJ.exe upx behavioral2/memory/2016-368-0x00007FF6289F0000-0x00007FF628DE2000-memory.dmp upx behavioral2/memory/3160-371-0x00007FF7261D0000-0x00007FF7265C2000-memory.dmp upx behavioral2/memory/2948-373-0x00007FF674EC0000-0x00007FF6752B2000-memory.dmp upx behavioral2/memory/2960-374-0x00007FF63A600000-0x00007FF63A9F2000-memory.dmp upx behavioral2/memory/1928-372-0x00007FF79CB60000-0x00007FF79CF52000-memory.dmp upx behavioral2/memory/1948-370-0x00007FF780B30000-0x00007FF780F22000-memory.dmp upx C:\Windows\System\laaHjvu.exe upx C:\Windows\System\SUoppDE.exe upx C:\Windows\System\vKdbnhm.exe upx C:\Windows\System\ccVncHe.exe upx behavioral2/memory/960-375-0x00007FF721660000-0x00007FF721A52000-memory.dmp upx C:\Windows\System\rtfeKkF.exe upx C:\Windows\System\IPOwzGT.exe upx C:\Windows\System\QjGQrCH.exe upx C:\Windows\System\vXzWkaT.exe upx C:\Windows\System\RdEdqzy.exe upx C:\Windows\System\sFVTSRL.exe upx C:\Windows\System\XQTtzST.exe upx C:\Windows\System\okpqglc.exe upx C:\Windows\System\hiotGkt.exe upx C:\Windows\System\aTwTwnd.exe upx C:\Windows\System\pEmheoo.exe upx behavioral2/memory/1976-75-0x00007FF731BA0000-0x00007FF731F92000-memory.dmp upx C:\Windows\System\tYQDfah.exe upx behavioral2/memory/4184-39-0x00007FF6D1800000-0x00007FF6D1BF2000-memory.dmp upx behavioral2/memory/3428-33-0x00007FF6D5EE0000-0x00007FF6D62D2000-memory.dmp upx behavioral2/memory/4404-22-0x00007FF67D820000-0x00007FF67DC12000-memory.dmp upx behavioral2/memory/3700-15-0x00007FF6FF220000-0x00007FF6FF612000-memory.dmp upx C:\Windows\System\zjvilka.exe upx behavioral2/memory/2956-377-0x00007FF7BD750000-0x00007FF7BDB42000-memory.dmp upx behavioral2/memory/60-376-0x00007FF78DE10000-0x00007FF78E202000-memory.dmp upx behavioral2/memory/2664-379-0x00007FF6B0EE0000-0x00007FF6B12D2000-memory.dmp upx behavioral2/memory/788-380-0x00007FF7E2220000-0x00007FF7E2612000-memory.dmp upx behavioral2/memory/4880-381-0x00007FF713260000-0x00007FF713652000-memory.dmp upx behavioral2/memory/1444-382-0x00007FF7AA510000-0x00007FF7AA902000-memory.dmp upx behavioral2/memory/3920-384-0x00007FF786360000-0x00007FF786752000-memory.dmp upx behavioral2/memory/4716-385-0x00007FF6B1220000-0x00007FF6B1612000-memory.dmp upx behavioral2/memory/3316-386-0x00007FF79BBB0000-0x00007FF79BFA2000-memory.dmp upx behavioral2/memory/3756-383-0x00007FF717650000-0x00007FF717A42000-memory.dmp upx behavioral2/memory/3724-378-0x00007FF64DD60000-0x00007FF64E152000-memory.dmp upx behavioral2/memory/4184-3465-0x00007FF6D1800000-0x00007FF6D1BF2000-memory.dmp upx behavioral2/memory/3700-3625-0x00007FF6FF220000-0x00007FF6FF612000-memory.dmp upx behavioral2/memory/4404-3624-0x00007FF67D820000-0x00007FF67DC12000-memory.dmp upx behavioral2/memory/1976-3628-0x00007FF731BA0000-0x00007FF731F92000-memory.dmp upx behavioral2/memory/3428-3629-0x00007FF6D5EE0000-0x00007FF6D62D2000-memory.dmp upx behavioral2/memory/4856-3631-0x00007FF777C70000-0x00007FF778062000-memory.dmp upx -
Enumerates connected drives 3 TTPs 20 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc process File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Drops file in Windows directory 64 IoCs
Processes:
80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exedescription ioc process File created C:\Windows\System\kUXLQCT.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\GIgVblS.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\LBvLaBC.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\JSMPjQJ.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\fxrRBnF.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\zZlCmQJ.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\wUNIoRr.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\pQZXslT.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\XexaTyS.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\rvCKgum.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\dMmrSvs.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\axowrmS.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\HAKzeYi.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\gNdeHsU.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\YfzKDGD.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\vvuLeOO.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\TkyVsca.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\FyQLTMo.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\euwYeRn.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\uZRdMHn.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\wBzDOXa.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\FhnxtiA.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\poXDuHO.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\MbYHqTb.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\csYjvOh.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\tLupble.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\oeRvEEd.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\SJqOjuw.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\dcyDfCG.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\IdlvcPG.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\HReFFmy.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\nFaMFxl.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\GffVPqY.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\fWEhbdR.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\AaNkUBg.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\jIMgcoz.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\GpvzeiA.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\LPScxHo.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\HAjqZIz.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\tNjGCtM.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\hEQVfDZ.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\JvmoEqP.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\FaUdLhc.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\aJOteEt.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\ZgdRRKe.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\mVQCJcK.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\migSSmy.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\OkPeUkI.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\LmZYskP.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\LQmfUWU.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\aKzmFqX.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\nSiQKtE.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\XQlQgvE.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\fngBjuD.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\jJBYdgJ.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\HCBLsKS.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\OADrXKp.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\uBaUEHP.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\QbkhbRA.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\qvpgeGS.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\uiIcUoT.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\hjxShoF.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\HVyCYxC.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe File created C:\Windows\System\APmRsBC.exe 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
wermgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
wermgr.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe -
Processes:
SearchApp.exeSearchApp.exeSearchApp.exeSearchApp.exeSearchApp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe -
Modifies registry class 64 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeSearchApp.exeSearchApp.exeexplorer.exeSearchApp.exeStartMenuExperienceHost.exeexplorer.exeexplorer.exeSearchApp.exeexplorer.exeSearchApp.exeexplorer.exeexplorer.exeStartMenuExperienceHost.exeexplorer.exeStartMenuExperienceHost.exeStartMenuExperienceHost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3665033694-1447845302-680750983-1000\{76C49466-DA07-4439-80EE-9EA3E5CCA9AB} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3665033694-1447845302-680750983-1000\{F3053133-2A2F-46B7-9967-996889E948CF} explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3665033694-1447845302-680750983-1000\{A2FB658B-7217-4070-9E7C-189BDB5EB4B0} explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3665033694-1447845302-680750983-1000\{B21A3476-85DC-497A-933E-D264C818C2DC} explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepid process 5000 powershell.exe 5000 powershell.exe 5000 powershell.exe 5000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exepowershell.exeexplorer.exeexplorer.exeexplorer.exedescription pid process Token: SeLockMemoryPrivilege 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe Token: SeLockMemoryPrivilege 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe Token: SeDebugPrivilege 5000 powershell.exe Token: SeShutdownPrivilege 836 explorer.exe Token: SeCreatePagefilePrivilege 836 explorer.exe Token: SeShutdownPrivilege 836 explorer.exe Token: SeCreatePagefilePrivilege 836 explorer.exe Token: SeShutdownPrivilege 836 explorer.exe Token: SeCreatePagefilePrivilege 836 explorer.exe Token: SeShutdownPrivilege 836 explorer.exe Token: SeCreatePagefilePrivilege 836 explorer.exe Token: SeShutdownPrivilege 836 explorer.exe Token: SeCreatePagefilePrivilege 836 explorer.exe Token: SeShutdownPrivilege 836 explorer.exe Token: SeCreatePagefilePrivilege 836 explorer.exe Token: SeShutdownPrivilege 836 explorer.exe Token: SeCreatePagefilePrivilege 836 explorer.exe Token: SeShutdownPrivilege 836 explorer.exe Token: SeCreatePagefilePrivilege 836 explorer.exe Token: SeShutdownPrivilege 836 explorer.exe Token: SeCreatePagefilePrivilege 836 explorer.exe Token: SeShutdownPrivilege 836 explorer.exe Token: SeCreatePagefilePrivilege 836 explorer.exe Token: SeShutdownPrivilege 836 explorer.exe Token: SeCreatePagefilePrivilege 836 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeCreatePagefilePrivilege 1876 explorer.exe Token: SeShutdownPrivilege 2884 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
sihost.exeexplorer.exeexplorer.exepid process 832 sihost.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exepid process 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 836 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 5748 explorer.exe 5748 explorer.exe 5748 explorer.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
StartMenuExperienceHost.exeStartMenuExperienceHost.exeSearchApp.exeStartMenuExperienceHost.exeSearchApp.exeStartMenuExperienceHost.exeStartMenuExperienceHost.exeSearchApp.exeStartMenuExperienceHost.exeStartMenuExperienceHost.exeSearchApp.exeStartMenuExperienceHost.exeStartMenuExperienceHost.exeSearchApp.exeStartMenuExperienceHost.exeSearchApp.exepid process 12212 StartMenuExperienceHost.exe 1128 StartMenuExperienceHost.exe 756 SearchApp.exe 8820 StartMenuExperienceHost.exe 3712 SearchApp.exe 3728 StartMenuExperienceHost.exe 4692 StartMenuExperienceHost.exe 10224 SearchApp.exe 3192 StartMenuExperienceHost.exe 5580 StartMenuExperienceHost.exe 7600 SearchApp.exe 7300 StartMenuExperienceHost.exe 8600 StartMenuExperienceHost.exe 4260 SearchApp.exe 9672 StartMenuExperienceHost.exe 1444 SearchApp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exedescription pid process target process PID 4108 wrote to memory of 5000 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe powershell.exe PID 4108 wrote to memory of 5000 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe powershell.exe PID 4108 wrote to memory of 3700 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe xPvWnKI.exe PID 4108 wrote to memory of 3700 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe xPvWnKI.exe PID 4108 wrote to memory of 4404 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe zjvilka.exe PID 4108 wrote to memory of 4404 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe zjvilka.exe PID 4108 wrote to memory of 1976 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe PtHygGf.exe PID 4108 wrote to memory of 1976 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe PtHygGf.exe PID 4108 wrote to memory of 3428 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe VSsDrNE.exe PID 4108 wrote to memory of 3428 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe VSsDrNE.exe PID 4108 wrote to memory of 4856 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe zaiqPaj.exe PID 4108 wrote to memory of 4856 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe zaiqPaj.exe PID 4108 wrote to memory of 4184 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe CgNEims.exe PID 4108 wrote to memory of 4184 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe CgNEims.exe PID 4108 wrote to memory of 2016 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe apclgLI.exe PID 4108 wrote to memory of 2016 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe apclgLI.exe PID 4108 wrote to memory of 3920 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe mbFMNHX.exe PID 4108 wrote to memory of 3920 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe mbFMNHX.exe PID 4108 wrote to memory of 4716 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe ftUyhaz.exe PID 4108 wrote to memory of 4716 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe ftUyhaz.exe PID 4108 wrote to memory of 1948 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe tYQDfah.exe PID 4108 wrote to memory of 1948 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe tYQDfah.exe PID 4108 wrote to memory of 3160 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe jzIopth.exe PID 4108 wrote to memory of 3160 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe jzIopth.exe PID 4108 wrote to memory of 1928 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe pEmheoo.exe PID 4108 wrote to memory of 1928 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe pEmheoo.exe PID 4108 wrote to memory of 3316 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe aTwTwnd.exe PID 4108 wrote to memory of 3316 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe aTwTwnd.exe PID 4108 wrote to memory of 2948 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe hiotGkt.exe PID 4108 wrote to memory of 2948 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe hiotGkt.exe PID 4108 wrote to memory of 2960 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe okpqglc.exe PID 4108 wrote to memory of 2960 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe okpqglc.exe PID 4108 wrote to memory of 960 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe HwmblCG.exe PID 4108 wrote to memory of 960 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe HwmblCG.exe PID 4108 wrote to memory of 60 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe XQTtzST.exe PID 4108 wrote to memory of 60 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe XQTtzST.exe PID 4108 wrote to memory of 2956 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe lFbNZEF.exe PID 4108 wrote to memory of 2956 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe lFbNZEF.exe PID 4108 wrote to memory of 3724 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe sFVTSRL.exe PID 4108 wrote to memory of 3724 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe sFVTSRL.exe PID 4108 wrote to memory of 2664 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe fTTgQna.exe PID 4108 wrote to memory of 2664 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe fTTgQna.exe PID 4108 wrote to memory of 788 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe RdEdqzy.exe PID 4108 wrote to memory of 788 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe RdEdqzy.exe PID 4108 wrote to memory of 4880 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe vXzWkaT.exe PID 4108 wrote to memory of 4880 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe vXzWkaT.exe PID 4108 wrote to memory of 1444 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe lTfPfop.exe PID 4108 wrote to memory of 1444 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe lTfPfop.exe PID 4108 wrote to memory of 3756 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe QjGQrCH.exe PID 4108 wrote to memory of 3756 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe QjGQrCH.exe PID 4108 wrote to memory of 2304 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe IPOwzGT.exe PID 4108 wrote to memory of 2304 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe IPOwzGT.exe PID 4108 wrote to memory of 3596 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe RCUfeaX.exe PID 4108 wrote to memory of 3596 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe RCUfeaX.exe PID 4108 wrote to memory of 3936 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe rtfeKkF.exe PID 4108 wrote to memory of 3936 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe rtfeKkF.exe PID 4108 wrote to memory of 3912 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe ccVncHe.exe PID 4108 wrote to memory of 3912 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe ccVncHe.exe PID 4108 wrote to memory of 2464 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe zYhdmZi.exe PID 4108 wrote to memory of 2464 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe zYhdmZi.exe PID 4108 wrote to memory of 2220 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe YrINZoJ.exe PID 4108 wrote to memory of 2220 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe YrINZoJ.exe PID 4108 wrote to memory of 2700 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe SUoppDE.exe PID 4108 wrote to memory of 2700 4108 80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe SUoppDE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\80dc2d7acd231de40f111d1119717ed0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Invoke-WebRequest "https://raw.githubusercontent.com/" "2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "5000" "2936" "2848" "2940" "0" "0" "2944" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\System\xPvWnKI.exeC:\Windows\System\xPvWnKI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zjvilka.exeC:\Windows\System\zjvilka.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\PtHygGf.exeC:\Windows\System\PtHygGf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VSsDrNE.exeC:\Windows\System\VSsDrNE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zaiqPaj.exeC:\Windows\System\zaiqPaj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CgNEims.exeC:\Windows\System\CgNEims.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\apclgLI.exeC:\Windows\System\apclgLI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mbFMNHX.exeC:\Windows\System\mbFMNHX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ftUyhaz.exeC:\Windows\System\ftUyhaz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tYQDfah.exeC:\Windows\System\tYQDfah.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jzIopth.exeC:\Windows\System\jzIopth.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pEmheoo.exeC:\Windows\System\pEmheoo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aTwTwnd.exeC:\Windows\System\aTwTwnd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\hiotGkt.exeC:\Windows\System\hiotGkt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\okpqglc.exeC:\Windows\System\okpqglc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HwmblCG.exeC:\Windows\System\HwmblCG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XQTtzST.exeC:\Windows\System\XQTtzST.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lFbNZEF.exeC:\Windows\System\lFbNZEF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sFVTSRL.exeC:\Windows\System\sFVTSRL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fTTgQna.exeC:\Windows\System\fTTgQna.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RdEdqzy.exeC:\Windows\System\RdEdqzy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vXzWkaT.exeC:\Windows\System\vXzWkaT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lTfPfop.exeC:\Windows\System\lTfPfop.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QjGQrCH.exeC:\Windows\System\QjGQrCH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IPOwzGT.exeC:\Windows\System\IPOwzGT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RCUfeaX.exeC:\Windows\System\RCUfeaX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rtfeKkF.exeC:\Windows\System\rtfeKkF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ccVncHe.exeC:\Windows\System\ccVncHe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zYhdmZi.exeC:\Windows\System\zYhdmZi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YrINZoJ.exeC:\Windows\System\YrINZoJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SUoppDE.exeC:\Windows\System\SUoppDE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vKdbnhm.exeC:\Windows\System\vKdbnhm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\laaHjvu.exeC:\Windows\System\laaHjvu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gQlUVPj.exeC:\Windows\System\gQlUVPj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OMBnxmd.exeC:\Windows\System\OMBnxmd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xJHTMEJ.exeC:\Windows\System\xJHTMEJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TsWltXN.exeC:\Windows\System\TsWltXN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gFxlOlJ.exeC:\Windows\System\gFxlOlJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bedNttN.exeC:\Windows\System\bedNttN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HhrsQFg.exeC:\Windows\System\HhrsQFg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yFtKeCC.exeC:\Windows\System\yFtKeCC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rQiDVIk.exeC:\Windows\System\rQiDVIk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NpkKkbu.exeC:\Windows\System\NpkKkbu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MRBjkBv.exeC:\Windows\System\MRBjkBv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jnuIJSX.exeC:\Windows\System\jnuIJSX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EXQlSZf.exeC:\Windows\System\EXQlSZf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jcDXVsw.exeC:\Windows\System\jcDXVsw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uGvJajE.exeC:\Windows\System\uGvJajE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OxhTLtW.exeC:\Windows\System\OxhTLtW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qYytScm.exeC:\Windows\System\qYytScm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KakYBPF.exeC:\Windows\System\KakYBPF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dBaWaQc.exeC:\Windows\System\dBaWaQc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SoCpjhw.exeC:\Windows\System\SoCpjhw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lJmEeHE.exeC:\Windows\System\lJmEeHE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dDGAroB.exeC:\Windows\System\dDGAroB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GnVOqoL.exeC:\Windows\System\GnVOqoL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EjKcJGv.exeC:\Windows\System\EjKcJGv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pOofyuB.exeC:\Windows\System\pOofyuB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qGzoPqC.exeC:\Windows\System\qGzoPqC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JlTQbtj.exeC:\Windows\System\JlTQbtj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WdQJwgb.exeC:\Windows\System\WdQJwgb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\eeRPtTj.exeC:\Windows\System\eeRPtTj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CdcTbzd.exeC:\Windows\System\CdcTbzd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dioDzCg.exeC:\Windows\System\dioDzCg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SFfOJQW.exeC:\Windows\System\SFfOJQW.exe2⤵
-
C:\Windows\System\DdifYEg.exeC:\Windows\System\DdifYEg.exe2⤵
-
C:\Windows\System\xWMFeDh.exeC:\Windows\System\xWMFeDh.exe2⤵
-
C:\Windows\System\gNQxjys.exeC:\Windows\System\gNQxjys.exe2⤵
-
C:\Windows\System\oNTzaOQ.exeC:\Windows\System\oNTzaOQ.exe2⤵
-
C:\Windows\System\waIauYr.exeC:\Windows\System\waIauYr.exe2⤵
-
C:\Windows\System\CLceUKo.exeC:\Windows\System\CLceUKo.exe2⤵
-
C:\Windows\System\AJdordm.exeC:\Windows\System\AJdordm.exe2⤵
-
C:\Windows\System\kWwqDqo.exeC:\Windows\System\kWwqDqo.exe2⤵
-
C:\Windows\System\BJwRXDs.exeC:\Windows\System\BJwRXDs.exe2⤵
-
C:\Windows\System\wdUgNDi.exeC:\Windows\System\wdUgNDi.exe2⤵
-
C:\Windows\System\iCECABg.exeC:\Windows\System\iCECABg.exe2⤵
-
C:\Windows\System\zuPvEzj.exeC:\Windows\System\zuPvEzj.exe2⤵
-
C:\Windows\System\XKWtevB.exeC:\Windows\System\XKWtevB.exe2⤵
-
C:\Windows\System\vCHoLYt.exeC:\Windows\System\vCHoLYt.exe2⤵
-
C:\Windows\System\dVAOIXe.exeC:\Windows\System\dVAOIXe.exe2⤵
-
C:\Windows\System\TMyxEVh.exeC:\Windows\System\TMyxEVh.exe2⤵
-
C:\Windows\System\IwUtEzD.exeC:\Windows\System\IwUtEzD.exe2⤵
-
C:\Windows\System\ZAbbVDX.exeC:\Windows\System\ZAbbVDX.exe2⤵
-
C:\Windows\System\XScsdyL.exeC:\Windows\System\XScsdyL.exe2⤵
-
C:\Windows\System\YTfTRVK.exeC:\Windows\System\YTfTRVK.exe2⤵
-
C:\Windows\System\ofBUwxy.exeC:\Windows\System\ofBUwxy.exe2⤵
-
C:\Windows\System\SAnhcxh.exeC:\Windows\System\SAnhcxh.exe2⤵
-
C:\Windows\System\yZJKNvy.exeC:\Windows\System\yZJKNvy.exe2⤵
-
C:\Windows\System\aySxKYl.exeC:\Windows\System\aySxKYl.exe2⤵
-
C:\Windows\System\OQhYvfK.exeC:\Windows\System\OQhYvfK.exe2⤵
-
C:\Windows\System\tgPdDOj.exeC:\Windows\System\tgPdDOj.exe2⤵
-
C:\Windows\System\tbnVnvG.exeC:\Windows\System\tbnVnvG.exe2⤵
-
C:\Windows\System\NsotrTQ.exeC:\Windows\System\NsotrTQ.exe2⤵
-
C:\Windows\System\mxWLOdu.exeC:\Windows\System\mxWLOdu.exe2⤵
-
C:\Windows\System\BERIYiA.exeC:\Windows\System\BERIYiA.exe2⤵
-
C:\Windows\System\cLtvVvQ.exeC:\Windows\System\cLtvVvQ.exe2⤵
-
C:\Windows\System\mipxjQF.exeC:\Windows\System\mipxjQF.exe2⤵
-
C:\Windows\System\MZEUGWW.exeC:\Windows\System\MZEUGWW.exe2⤵
-
C:\Windows\System\LTJFBrp.exeC:\Windows\System\LTJFBrp.exe2⤵
-
C:\Windows\System\JJHrdHK.exeC:\Windows\System\JJHrdHK.exe2⤵
-
C:\Windows\System\fcZXJtq.exeC:\Windows\System\fcZXJtq.exe2⤵
-
C:\Windows\System\HpcpBWg.exeC:\Windows\System\HpcpBWg.exe2⤵
-
C:\Windows\System\zczeBtA.exeC:\Windows\System\zczeBtA.exe2⤵
-
C:\Windows\System\merTMyt.exeC:\Windows\System\merTMyt.exe2⤵
-
C:\Windows\System\axiaMvp.exeC:\Windows\System\axiaMvp.exe2⤵
-
C:\Windows\System\fFZqVqi.exeC:\Windows\System\fFZqVqi.exe2⤵
-
C:\Windows\System\xoabMDC.exeC:\Windows\System\xoabMDC.exe2⤵
-
C:\Windows\System\QydIeAd.exeC:\Windows\System\QydIeAd.exe2⤵
-
C:\Windows\System\bJXcgZv.exeC:\Windows\System\bJXcgZv.exe2⤵
-
C:\Windows\System\ADwqqwu.exeC:\Windows\System\ADwqqwu.exe2⤵
-
C:\Windows\System\HcwrSaJ.exeC:\Windows\System\HcwrSaJ.exe2⤵
-
C:\Windows\System\kcjxhJf.exeC:\Windows\System\kcjxhJf.exe2⤵
-
C:\Windows\System\zWfhjHk.exeC:\Windows\System\zWfhjHk.exe2⤵
-
C:\Windows\System\LFfYsyF.exeC:\Windows\System\LFfYsyF.exe2⤵
-
C:\Windows\System\RLeujYX.exeC:\Windows\System\RLeujYX.exe2⤵
-
C:\Windows\System\iaWAZBq.exeC:\Windows\System\iaWAZBq.exe2⤵
-
C:\Windows\System\JnTliAs.exeC:\Windows\System\JnTliAs.exe2⤵
-
C:\Windows\System\PrDUMsD.exeC:\Windows\System\PrDUMsD.exe2⤵
-
C:\Windows\System\RnbKsRs.exeC:\Windows\System\RnbKsRs.exe2⤵
-
C:\Windows\System\prYYXwn.exeC:\Windows\System\prYYXwn.exe2⤵
-
C:\Windows\System\BuPNtkX.exeC:\Windows\System\BuPNtkX.exe2⤵
-
C:\Windows\System\dEHSvNc.exeC:\Windows\System\dEHSvNc.exe2⤵
-
C:\Windows\System\PuGcMBD.exeC:\Windows\System\PuGcMBD.exe2⤵
-
C:\Windows\System\NMWCuNZ.exeC:\Windows\System\NMWCuNZ.exe2⤵
-
C:\Windows\System\lsQATyX.exeC:\Windows\System\lsQATyX.exe2⤵
-
C:\Windows\System\zkgsWsO.exeC:\Windows\System\zkgsWsO.exe2⤵
-
C:\Windows\System\eUIEwdh.exeC:\Windows\System\eUIEwdh.exe2⤵
-
C:\Windows\System\RHnEJqq.exeC:\Windows\System\RHnEJqq.exe2⤵
-
C:\Windows\System\JTuGnEl.exeC:\Windows\System\JTuGnEl.exe2⤵
-
C:\Windows\System\FtIGUrY.exeC:\Windows\System\FtIGUrY.exe2⤵
-
C:\Windows\System\HYJmQAn.exeC:\Windows\System\HYJmQAn.exe2⤵
-
C:\Windows\System\EDDDSbh.exeC:\Windows\System\EDDDSbh.exe2⤵
-
C:\Windows\System\AhRvmVR.exeC:\Windows\System\AhRvmVR.exe2⤵
-
C:\Windows\System\MEmveXD.exeC:\Windows\System\MEmveXD.exe2⤵
-
C:\Windows\System\lIurAfF.exeC:\Windows\System\lIurAfF.exe2⤵
-
C:\Windows\System\aoZiDDM.exeC:\Windows\System\aoZiDDM.exe2⤵
-
C:\Windows\System\nmzOCcZ.exeC:\Windows\System\nmzOCcZ.exe2⤵
-
C:\Windows\System\MapVYIh.exeC:\Windows\System\MapVYIh.exe2⤵
-
C:\Windows\System\YcliakF.exeC:\Windows\System\YcliakF.exe2⤵
-
C:\Windows\System\suREVEU.exeC:\Windows\System\suREVEU.exe2⤵
-
C:\Windows\System\hjceyGx.exeC:\Windows\System\hjceyGx.exe2⤵
-
C:\Windows\System\Kpfeqba.exeC:\Windows\System\Kpfeqba.exe2⤵
-
C:\Windows\System\wgAzBRK.exeC:\Windows\System\wgAzBRK.exe2⤵
-
C:\Windows\System\XgSiASU.exeC:\Windows\System\XgSiASU.exe2⤵
-
C:\Windows\System\BbQyqxb.exeC:\Windows\System\BbQyqxb.exe2⤵
-
C:\Windows\System\esGSNtf.exeC:\Windows\System\esGSNtf.exe2⤵
-
C:\Windows\System\twJxeFX.exeC:\Windows\System\twJxeFX.exe2⤵
-
C:\Windows\System\dsEMSeZ.exeC:\Windows\System\dsEMSeZ.exe2⤵
-
C:\Windows\System\rSvQoiV.exeC:\Windows\System\rSvQoiV.exe2⤵
-
C:\Windows\System\XqpKoMt.exeC:\Windows\System\XqpKoMt.exe2⤵
-
C:\Windows\System\FUlrNWG.exeC:\Windows\System\FUlrNWG.exe2⤵
-
C:\Windows\System\HNJTZzI.exeC:\Windows\System\HNJTZzI.exe2⤵
-
C:\Windows\System\xhseJDq.exeC:\Windows\System\xhseJDq.exe2⤵
-
C:\Windows\System\ubmgOTr.exeC:\Windows\System\ubmgOTr.exe2⤵
-
C:\Windows\System\CRMmuXj.exeC:\Windows\System\CRMmuXj.exe2⤵
-
C:\Windows\System\oqosdDT.exeC:\Windows\System\oqosdDT.exe2⤵
-
C:\Windows\System\CRkixxF.exeC:\Windows\System\CRkixxF.exe2⤵
-
C:\Windows\System\FvmwDer.exeC:\Windows\System\FvmwDer.exe2⤵
-
C:\Windows\System\dQwmOvY.exeC:\Windows\System\dQwmOvY.exe2⤵
-
C:\Windows\System\hVZVopB.exeC:\Windows\System\hVZVopB.exe2⤵
-
C:\Windows\System\JIbPKrE.exeC:\Windows\System\JIbPKrE.exe2⤵
-
C:\Windows\System\BLzmtRg.exeC:\Windows\System\BLzmtRg.exe2⤵
-
C:\Windows\System\bkTlPLj.exeC:\Windows\System\bkTlPLj.exe2⤵
-
C:\Windows\System\yVdruvz.exeC:\Windows\System\yVdruvz.exe2⤵
-
C:\Windows\System\rRpzSyF.exeC:\Windows\System\rRpzSyF.exe2⤵
-
C:\Windows\System\HrRdbcA.exeC:\Windows\System\HrRdbcA.exe2⤵
-
C:\Windows\System\ERnKJGb.exeC:\Windows\System\ERnKJGb.exe2⤵
-
C:\Windows\System\iHYImTY.exeC:\Windows\System\iHYImTY.exe2⤵
-
C:\Windows\System\ckOyTRh.exeC:\Windows\System\ckOyTRh.exe2⤵
-
C:\Windows\System\urNrzUz.exeC:\Windows\System\urNrzUz.exe2⤵
-
C:\Windows\System\GLleqFt.exeC:\Windows\System\GLleqFt.exe2⤵
-
C:\Windows\System\RunCnPY.exeC:\Windows\System\RunCnPY.exe2⤵
-
C:\Windows\System\OEjmEAd.exeC:\Windows\System\OEjmEAd.exe2⤵
-
C:\Windows\System\uhSCedB.exeC:\Windows\System\uhSCedB.exe2⤵
-
C:\Windows\System\BoAQWdP.exeC:\Windows\System\BoAQWdP.exe2⤵
-
C:\Windows\System\CrAOmSp.exeC:\Windows\System\CrAOmSp.exe2⤵
-
C:\Windows\System\arorKJj.exeC:\Windows\System\arorKJj.exe2⤵
-
C:\Windows\System\jMdwfjS.exeC:\Windows\System\jMdwfjS.exe2⤵
-
C:\Windows\System\yaYPPhD.exeC:\Windows\System\yaYPPhD.exe2⤵
-
C:\Windows\System\ohtugvU.exeC:\Windows\System\ohtugvU.exe2⤵
-
C:\Windows\System\wDhPXHO.exeC:\Windows\System\wDhPXHO.exe2⤵
-
C:\Windows\System\jHDgSaW.exeC:\Windows\System\jHDgSaW.exe2⤵
-
C:\Windows\System\HjyoNUM.exeC:\Windows\System\HjyoNUM.exe2⤵
-
C:\Windows\System\oJoDSAi.exeC:\Windows\System\oJoDSAi.exe2⤵
-
C:\Windows\System\bgnKAkD.exeC:\Windows\System\bgnKAkD.exe2⤵
-
C:\Windows\System\FMfrHOh.exeC:\Windows\System\FMfrHOh.exe2⤵
-
C:\Windows\System\BzqTUbS.exeC:\Windows\System\BzqTUbS.exe2⤵
-
C:\Windows\System\GjENEdY.exeC:\Windows\System\GjENEdY.exe2⤵
-
C:\Windows\System\InEMcAl.exeC:\Windows\System\InEMcAl.exe2⤵
-
C:\Windows\System\lCSWaCR.exeC:\Windows\System\lCSWaCR.exe2⤵
-
C:\Windows\System\nZOUMsq.exeC:\Windows\System\nZOUMsq.exe2⤵
-
C:\Windows\System\ahFLRNW.exeC:\Windows\System\ahFLRNW.exe2⤵
-
C:\Windows\System\VTvbolV.exeC:\Windows\System\VTvbolV.exe2⤵
-
C:\Windows\System\nNALuBH.exeC:\Windows\System\nNALuBH.exe2⤵
-
C:\Windows\System\lXPGRHj.exeC:\Windows\System\lXPGRHj.exe2⤵
-
C:\Windows\System\yAtBtqW.exeC:\Windows\System\yAtBtqW.exe2⤵
-
C:\Windows\System\gjzQEgY.exeC:\Windows\System\gjzQEgY.exe2⤵
-
C:\Windows\System\dQqxCQf.exeC:\Windows\System\dQqxCQf.exe2⤵
-
C:\Windows\System\FVIEYoT.exeC:\Windows\System\FVIEYoT.exe2⤵
-
C:\Windows\System\rwqqQfN.exeC:\Windows\System\rwqqQfN.exe2⤵
-
C:\Windows\System\cpQqHjr.exeC:\Windows\System\cpQqHjr.exe2⤵
-
C:\Windows\System\nFnrXfs.exeC:\Windows\System\nFnrXfs.exe2⤵
-
C:\Windows\System\JdXyVcT.exeC:\Windows\System\JdXyVcT.exe2⤵
-
C:\Windows\System\whpJPhR.exeC:\Windows\System\whpJPhR.exe2⤵
-
C:\Windows\System\uxJLqMt.exeC:\Windows\System\uxJLqMt.exe2⤵
-
C:\Windows\System\abjfRUc.exeC:\Windows\System\abjfRUc.exe2⤵
-
C:\Windows\System\WibCsiA.exeC:\Windows\System\WibCsiA.exe2⤵
-
C:\Windows\System\MrVBZxF.exeC:\Windows\System\MrVBZxF.exe2⤵
-
C:\Windows\System\QpkOTaq.exeC:\Windows\System\QpkOTaq.exe2⤵
-
C:\Windows\System\VxViHKa.exeC:\Windows\System\VxViHKa.exe2⤵
-
C:\Windows\System\NNcNRxc.exeC:\Windows\System\NNcNRxc.exe2⤵
-
C:\Windows\System\klGJTDn.exeC:\Windows\System\klGJTDn.exe2⤵
-
C:\Windows\System\VzrfKPv.exeC:\Windows\System\VzrfKPv.exe2⤵
-
C:\Windows\System\YIwPIxQ.exeC:\Windows\System\YIwPIxQ.exe2⤵
-
C:\Windows\System\treppJM.exeC:\Windows\System\treppJM.exe2⤵
-
C:\Windows\System\gtdeDyo.exeC:\Windows\System\gtdeDyo.exe2⤵
-
C:\Windows\System\uHmjszp.exeC:\Windows\System\uHmjszp.exe2⤵
-
C:\Windows\System\Kvsquyk.exeC:\Windows\System\Kvsquyk.exe2⤵
-
C:\Windows\System\HuaWGrp.exeC:\Windows\System\HuaWGrp.exe2⤵
-
C:\Windows\System\MZXWvMg.exeC:\Windows\System\MZXWvMg.exe2⤵
-
C:\Windows\System\XjIKBeh.exeC:\Windows\System\XjIKBeh.exe2⤵
-
C:\Windows\System\CQWqXJB.exeC:\Windows\System\CQWqXJB.exe2⤵
-
C:\Windows\System\rTalhNN.exeC:\Windows\System\rTalhNN.exe2⤵
-
C:\Windows\System\trDFlth.exeC:\Windows\System\trDFlth.exe2⤵
-
C:\Windows\System\meoqROw.exeC:\Windows\System\meoqROw.exe2⤵
-
C:\Windows\System\RjjumWF.exeC:\Windows\System\RjjumWF.exe2⤵
-
C:\Windows\System\TNlcCSx.exeC:\Windows\System\TNlcCSx.exe2⤵
-
C:\Windows\System\RAeXHUA.exeC:\Windows\System\RAeXHUA.exe2⤵
-
C:\Windows\System\KbWiFOw.exeC:\Windows\System\KbWiFOw.exe2⤵
-
C:\Windows\System\JZxFoHF.exeC:\Windows\System\JZxFoHF.exe2⤵
-
C:\Windows\System\XtxPdUT.exeC:\Windows\System\XtxPdUT.exe2⤵
-
C:\Windows\System\hSRnOfK.exeC:\Windows\System\hSRnOfK.exe2⤵
-
C:\Windows\System\fbFGUVZ.exeC:\Windows\System\fbFGUVZ.exe2⤵
-
C:\Windows\System\tGNCDZi.exeC:\Windows\System\tGNCDZi.exe2⤵
-
C:\Windows\System\pIdPmTf.exeC:\Windows\System\pIdPmTf.exe2⤵
-
C:\Windows\System\QxDPskL.exeC:\Windows\System\QxDPskL.exe2⤵
-
C:\Windows\System\colSnev.exeC:\Windows\System\colSnev.exe2⤵
-
C:\Windows\System\RfDfxrl.exeC:\Windows\System\RfDfxrl.exe2⤵
-
C:\Windows\System\QCuUWtd.exeC:\Windows\System\QCuUWtd.exe2⤵
-
C:\Windows\System\XnVqJnB.exeC:\Windows\System\XnVqJnB.exe2⤵
-
C:\Windows\System\erLOZFy.exeC:\Windows\System\erLOZFy.exe2⤵
-
C:\Windows\System\LzcLskC.exeC:\Windows\System\LzcLskC.exe2⤵
-
C:\Windows\System\YSbWdJW.exeC:\Windows\System\YSbWdJW.exe2⤵
-
C:\Windows\System\dcbobPD.exeC:\Windows\System\dcbobPD.exe2⤵
-
C:\Windows\System\jgEvRVT.exeC:\Windows\System\jgEvRVT.exe2⤵
-
C:\Windows\System\YfZkrxW.exeC:\Windows\System\YfZkrxW.exe2⤵
-
C:\Windows\System\eWEalnY.exeC:\Windows\System\eWEalnY.exe2⤵
-
C:\Windows\System\XwRpGGY.exeC:\Windows\System\XwRpGGY.exe2⤵
-
C:\Windows\System\meRPCMD.exeC:\Windows\System\meRPCMD.exe2⤵
-
C:\Windows\System\FQjSIfY.exeC:\Windows\System\FQjSIfY.exe2⤵
-
C:\Windows\System\VSSDRdY.exeC:\Windows\System\VSSDRdY.exe2⤵
-
C:\Windows\System\tEoHeTA.exeC:\Windows\System\tEoHeTA.exe2⤵
-
C:\Windows\System\jwEbnUO.exeC:\Windows\System\jwEbnUO.exe2⤵
-
C:\Windows\System\FCCwapa.exeC:\Windows\System\FCCwapa.exe2⤵
-
C:\Windows\System\JNQFcYT.exeC:\Windows\System\JNQFcYT.exe2⤵
-
C:\Windows\System\ykxMnDV.exeC:\Windows\System\ykxMnDV.exe2⤵
-
C:\Windows\System\GnHbhvm.exeC:\Windows\System\GnHbhvm.exe2⤵
-
C:\Windows\System\BjESlON.exeC:\Windows\System\BjESlON.exe2⤵
-
C:\Windows\System\Xbtfvqt.exeC:\Windows\System\Xbtfvqt.exe2⤵
-
C:\Windows\System\WslUgqU.exeC:\Windows\System\WslUgqU.exe2⤵
-
C:\Windows\System\bxCAkiJ.exeC:\Windows\System\bxCAkiJ.exe2⤵
-
C:\Windows\System\bbuXdVo.exeC:\Windows\System\bbuXdVo.exe2⤵
-
C:\Windows\System\esDRnnd.exeC:\Windows\System\esDRnnd.exe2⤵
-
C:\Windows\System\YpAAOGZ.exeC:\Windows\System\YpAAOGZ.exe2⤵
-
C:\Windows\System\mvoidLW.exeC:\Windows\System\mvoidLW.exe2⤵
-
C:\Windows\System\OUlwvFv.exeC:\Windows\System\OUlwvFv.exe2⤵
-
C:\Windows\System\gedUNnk.exeC:\Windows\System\gedUNnk.exe2⤵
-
C:\Windows\System\akbfLKH.exeC:\Windows\System\akbfLKH.exe2⤵
-
C:\Windows\System\iDHKrpj.exeC:\Windows\System\iDHKrpj.exe2⤵
-
C:\Windows\System\goRDcKO.exeC:\Windows\System\goRDcKO.exe2⤵
-
C:\Windows\System\aSdYOFy.exeC:\Windows\System\aSdYOFy.exe2⤵
-
C:\Windows\System\BYBSAHo.exeC:\Windows\System\BYBSAHo.exe2⤵
-
C:\Windows\System\Bberolm.exeC:\Windows\System\Bberolm.exe2⤵
-
C:\Windows\System\CXEATij.exeC:\Windows\System\CXEATij.exe2⤵
-
C:\Windows\System\EoPTdcg.exeC:\Windows\System\EoPTdcg.exe2⤵
-
C:\Windows\System\txXFslG.exeC:\Windows\System\txXFslG.exe2⤵
-
C:\Windows\System\MxMgtaL.exeC:\Windows\System\MxMgtaL.exe2⤵
-
C:\Windows\System\SJqOjuw.exeC:\Windows\System\SJqOjuw.exe2⤵
-
C:\Windows\System\rGRrVNe.exeC:\Windows\System\rGRrVNe.exe2⤵
-
C:\Windows\System\xbCeaQX.exeC:\Windows\System\xbCeaQX.exe2⤵
-
C:\Windows\System\wAtljkH.exeC:\Windows\System\wAtljkH.exe2⤵
-
C:\Windows\System\WwPWEgv.exeC:\Windows\System\WwPWEgv.exe2⤵
-
C:\Windows\System\QhQjAev.exeC:\Windows\System\QhQjAev.exe2⤵
-
C:\Windows\System\Gmcpdva.exeC:\Windows\System\Gmcpdva.exe2⤵
-
C:\Windows\System\rCZXWOf.exeC:\Windows\System\rCZXWOf.exe2⤵
-
C:\Windows\System\tEcQnkL.exeC:\Windows\System\tEcQnkL.exe2⤵
-
C:\Windows\System\alboXQv.exeC:\Windows\System\alboXQv.exe2⤵
-
C:\Windows\System\FjEYcVf.exeC:\Windows\System\FjEYcVf.exe2⤵
-
C:\Windows\System\BXLcEvR.exeC:\Windows\System\BXLcEvR.exe2⤵
-
C:\Windows\System\RjLYkns.exeC:\Windows\System\RjLYkns.exe2⤵
-
C:\Windows\System\ysjMjkN.exeC:\Windows\System\ysjMjkN.exe2⤵
-
C:\Windows\System\paGjQXf.exeC:\Windows\System\paGjQXf.exe2⤵
-
C:\Windows\System\tSzbdax.exeC:\Windows\System\tSzbdax.exe2⤵
-
C:\Windows\System\oWIJNvO.exeC:\Windows\System\oWIJNvO.exe2⤵
-
C:\Windows\System\PUmlwEs.exeC:\Windows\System\PUmlwEs.exe2⤵
-
C:\Windows\System\XufBEub.exeC:\Windows\System\XufBEub.exe2⤵
-
C:\Windows\System\INyDmBK.exeC:\Windows\System\INyDmBK.exe2⤵
-
C:\Windows\System\vzhkoVv.exeC:\Windows\System\vzhkoVv.exe2⤵
-
C:\Windows\System\JWGWvof.exeC:\Windows\System\JWGWvof.exe2⤵
-
C:\Windows\System\prnlcSQ.exeC:\Windows\System\prnlcSQ.exe2⤵
-
C:\Windows\System\PSPACOf.exeC:\Windows\System\PSPACOf.exe2⤵
-
C:\Windows\System\ePeoUGe.exeC:\Windows\System\ePeoUGe.exe2⤵
-
C:\Windows\System\lYgNimY.exeC:\Windows\System\lYgNimY.exe2⤵
-
C:\Windows\System\wBTMpyw.exeC:\Windows\System\wBTMpyw.exe2⤵
-
C:\Windows\System\cpptPay.exeC:\Windows\System\cpptPay.exe2⤵
-
C:\Windows\System\fowcDbJ.exeC:\Windows\System\fowcDbJ.exe2⤵
-
C:\Windows\System\VPzbwUI.exeC:\Windows\System\VPzbwUI.exe2⤵
-
C:\Windows\System\jhvfBgu.exeC:\Windows\System\jhvfBgu.exe2⤵
-
C:\Windows\System\ZecppyL.exeC:\Windows\System\ZecppyL.exe2⤵
-
C:\Windows\System\HyKEQJf.exeC:\Windows\System\HyKEQJf.exe2⤵
-
C:\Windows\System\zEpMNwY.exeC:\Windows\System\zEpMNwY.exe2⤵
-
C:\Windows\System\CEqZsMl.exeC:\Windows\System\CEqZsMl.exe2⤵
-
C:\Windows\System\EGmlRuF.exeC:\Windows\System\EGmlRuF.exe2⤵
-
C:\Windows\System\IiYLeDD.exeC:\Windows\System\IiYLeDD.exe2⤵
-
C:\Windows\System\mhWavJV.exeC:\Windows\System\mhWavJV.exe2⤵
-
C:\Windows\System\ylHeALw.exeC:\Windows\System\ylHeALw.exe2⤵
-
C:\Windows\System\xeKPPom.exeC:\Windows\System\xeKPPom.exe2⤵
-
C:\Windows\System\eNSiqGy.exeC:\Windows\System\eNSiqGy.exe2⤵
-
C:\Windows\System\qlHqwaF.exeC:\Windows\System\qlHqwaF.exe2⤵
-
C:\Windows\System\yFlovAW.exeC:\Windows\System\yFlovAW.exe2⤵
-
C:\Windows\System\qFBkVCb.exeC:\Windows\System\qFBkVCb.exe2⤵
-
C:\Windows\System\LOhYOyd.exeC:\Windows\System\LOhYOyd.exe2⤵
-
C:\Windows\System\soovSsH.exeC:\Windows\System\soovSsH.exe2⤵
-
C:\Windows\System\LMAmKDf.exeC:\Windows\System\LMAmKDf.exe2⤵
-
C:\Windows\System\OZmWVel.exeC:\Windows\System\OZmWVel.exe2⤵
-
C:\Windows\System\YqfyIQa.exeC:\Windows\System\YqfyIQa.exe2⤵
-
C:\Windows\System\qDKymHQ.exeC:\Windows\System\qDKymHQ.exe2⤵
-
C:\Windows\System\YIuBHtH.exeC:\Windows\System\YIuBHtH.exe2⤵
-
C:\Windows\System\uETHikt.exeC:\Windows\System\uETHikt.exe2⤵
-
C:\Windows\System\sxwyJXg.exeC:\Windows\System\sxwyJXg.exe2⤵
-
C:\Windows\System\cBwMvBH.exeC:\Windows\System\cBwMvBH.exe2⤵
-
C:\Windows\System\ltnZYsZ.exeC:\Windows\System\ltnZYsZ.exe2⤵
-
C:\Windows\System\CAdMOCl.exeC:\Windows\System\CAdMOCl.exe2⤵
-
C:\Windows\System\QMasbep.exeC:\Windows\System\QMasbep.exe2⤵
-
C:\Windows\System\oBybvxG.exeC:\Windows\System\oBybvxG.exe2⤵
-
C:\Windows\System\uydgBwf.exeC:\Windows\System\uydgBwf.exe2⤵
-
C:\Windows\System\sHfjsYa.exeC:\Windows\System\sHfjsYa.exe2⤵
-
C:\Windows\System\wCcYYRn.exeC:\Windows\System\wCcYYRn.exe2⤵
-
C:\Windows\System\vfrbHnv.exeC:\Windows\System\vfrbHnv.exe2⤵
-
C:\Windows\System\YErxUsG.exeC:\Windows\System\YErxUsG.exe2⤵
-
C:\Windows\System\uMKQllG.exeC:\Windows\System\uMKQllG.exe2⤵
-
C:\Windows\System\ZlnQyVp.exeC:\Windows\System\ZlnQyVp.exe2⤵
-
C:\Windows\System\PHgpdud.exeC:\Windows\System\PHgpdud.exe2⤵
-
C:\Windows\System\ZNsBWNJ.exeC:\Windows\System\ZNsBWNJ.exe2⤵
-
C:\Windows\System\UosCROv.exeC:\Windows\System\UosCROv.exe2⤵
-
C:\Windows\System\dmSADyI.exeC:\Windows\System\dmSADyI.exe2⤵
-
C:\Windows\System\INfnrML.exeC:\Windows\System\INfnrML.exe2⤵
-
C:\Windows\System\SikQKSN.exeC:\Windows\System\SikQKSN.exe2⤵
-
C:\Windows\System\nSvbCxU.exeC:\Windows\System\nSvbCxU.exe2⤵
-
C:\Windows\System\lnMWHVG.exeC:\Windows\System\lnMWHVG.exe2⤵
-
C:\Windows\System\PemrgQB.exeC:\Windows\System\PemrgQB.exe2⤵
-
C:\Windows\System\wkzokUY.exeC:\Windows\System\wkzokUY.exe2⤵
-
C:\Windows\System\ZAljyEX.exeC:\Windows\System\ZAljyEX.exe2⤵
-
C:\Windows\System\oJklczx.exeC:\Windows\System\oJklczx.exe2⤵
-
C:\Windows\System\ZQzrJhr.exeC:\Windows\System\ZQzrJhr.exe2⤵
-
C:\Windows\System\rnMIomp.exeC:\Windows\System\rnMIomp.exe2⤵
-
C:\Windows\System\YiBtDck.exeC:\Windows\System\YiBtDck.exe2⤵
-
C:\Windows\System\RaNpiUI.exeC:\Windows\System\RaNpiUI.exe2⤵
-
C:\Windows\System\OmKaKcJ.exeC:\Windows\System\OmKaKcJ.exe2⤵
-
C:\Windows\System\RfigDMP.exeC:\Windows\System\RfigDMP.exe2⤵
-
C:\Windows\System\LCuHvjg.exeC:\Windows\System\LCuHvjg.exe2⤵
-
C:\Windows\System\ZonnvUY.exeC:\Windows\System\ZonnvUY.exe2⤵
-
C:\Windows\System\QxPTKgh.exeC:\Windows\System\QxPTKgh.exe2⤵
-
C:\Windows\System\bwIiVlw.exeC:\Windows\System\bwIiVlw.exe2⤵
-
C:\Windows\System\twGtgSd.exeC:\Windows\System\twGtgSd.exe2⤵
-
C:\Windows\System\xnEhCyH.exeC:\Windows\System\xnEhCyH.exe2⤵
-
C:\Windows\System\nFnClEr.exeC:\Windows\System\nFnClEr.exe2⤵
-
C:\Windows\System\MbCcmNh.exeC:\Windows\System\MbCcmNh.exe2⤵
-
C:\Windows\System\wrSXOgL.exeC:\Windows\System\wrSXOgL.exe2⤵
-
C:\Windows\System\iaUfzGy.exeC:\Windows\System\iaUfzGy.exe2⤵
-
C:\Windows\System\iFcGpOk.exeC:\Windows\System\iFcGpOk.exe2⤵
-
C:\Windows\System\SuSlbuW.exeC:\Windows\System\SuSlbuW.exe2⤵
-
C:\Windows\System\SeAluKd.exeC:\Windows\System\SeAluKd.exe2⤵
-
C:\Windows\System\AIyoNjs.exeC:\Windows\System\AIyoNjs.exe2⤵
-
C:\Windows\System\allSlZW.exeC:\Windows\System\allSlZW.exe2⤵
-
C:\Windows\System\cisboJs.exeC:\Windows\System\cisboJs.exe2⤵
-
C:\Windows\System\PqKKDRL.exeC:\Windows\System\PqKKDRL.exe2⤵
-
C:\Windows\System\rwtKPBU.exeC:\Windows\System\rwtKPBU.exe2⤵
-
C:\Windows\System\GdLPwNU.exeC:\Windows\System\GdLPwNU.exe2⤵
-
C:\Windows\System\hZNRdHN.exeC:\Windows\System\hZNRdHN.exe2⤵
-
C:\Windows\System\rIYuFTM.exeC:\Windows\System\rIYuFTM.exe2⤵
-
C:\Windows\System\RwnQavo.exeC:\Windows\System\RwnQavo.exe2⤵
-
C:\Windows\System\EAuDzJI.exeC:\Windows\System\EAuDzJI.exe2⤵
-
C:\Windows\System\tuexMRS.exeC:\Windows\System\tuexMRS.exe2⤵
-
C:\Windows\System\XfzxFSF.exeC:\Windows\System\XfzxFSF.exe2⤵
-
C:\Windows\System\kueodiU.exeC:\Windows\System\kueodiU.exe2⤵
-
C:\Windows\System\VyPBbgm.exeC:\Windows\System\VyPBbgm.exe2⤵
-
C:\Windows\System\qmKRwVy.exeC:\Windows\System\qmKRwVy.exe2⤵
-
C:\Windows\System\kOSCsCY.exeC:\Windows\System\kOSCsCY.exe2⤵
-
C:\Windows\System\hEYorIo.exeC:\Windows\System\hEYorIo.exe2⤵
-
C:\Windows\System\TBHoNcX.exeC:\Windows\System\TBHoNcX.exe2⤵
-
C:\Windows\System\cTdHZmb.exeC:\Windows\System\cTdHZmb.exe2⤵
-
C:\Windows\System\XJEIDqd.exeC:\Windows\System\XJEIDqd.exe2⤵
-
C:\Windows\System\ujYLhnD.exeC:\Windows\System\ujYLhnD.exe2⤵
-
C:\Windows\System\KgjyTXp.exeC:\Windows\System\KgjyTXp.exe2⤵
-
C:\Windows\System\GeKuEIA.exeC:\Windows\System\GeKuEIA.exe2⤵
-
C:\Windows\System\OpsbWxh.exeC:\Windows\System\OpsbWxh.exe2⤵
-
C:\Windows\System\BEllhzF.exeC:\Windows\System\BEllhzF.exe2⤵
-
C:\Windows\System\rkFrpOp.exeC:\Windows\System\rkFrpOp.exe2⤵
-
C:\Windows\System\SEylcxj.exeC:\Windows\System\SEylcxj.exe2⤵
-
C:\Windows\System\IzHQsdz.exeC:\Windows\System\IzHQsdz.exe2⤵
-
C:\Windows\System\BfAKDrC.exeC:\Windows\System\BfAKDrC.exe2⤵
-
C:\Windows\System\eQclzNx.exeC:\Windows\System\eQclzNx.exe2⤵
-
C:\Windows\System\VjhmHYO.exeC:\Windows\System\VjhmHYO.exe2⤵
-
C:\Windows\System\HcllsaD.exeC:\Windows\System\HcllsaD.exe2⤵
-
C:\Windows\System\HVyCYxC.exeC:\Windows\System\HVyCYxC.exe2⤵
-
C:\Windows\System\kYEnRVp.exeC:\Windows\System\kYEnRVp.exe2⤵
-
C:\Windows\System\lpWKJWt.exeC:\Windows\System\lpWKJWt.exe2⤵
-
C:\Windows\System\qrpAKSD.exeC:\Windows\System\qrpAKSD.exe2⤵
-
C:\Windows\System\bdmcsGZ.exeC:\Windows\System\bdmcsGZ.exe2⤵
-
C:\Windows\System\MqzRUVV.exeC:\Windows\System\MqzRUVV.exe2⤵
-
C:\Windows\System\LKPyLnw.exeC:\Windows\System\LKPyLnw.exe2⤵
-
C:\Windows\System\bIZFiQg.exeC:\Windows\System\bIZFiQg.exe2⤵
-
C:\Windows\System\vlHUmPa.exeC:\Windows\System\vlHUmPa.exe2⤵
-
C:\Windows\System\uCASFpA.exeC:\Windows\System\uCASFpA.exe2⤵
-
C:\Windows\System\jnKjWmf.exeC:\Windows\System\jnKjWmf.exe2⤵
-
C:\Windows\System\TfmWMvd.exeC:\Windows\System\TfmWMvd.exe2⤵
-
C:\Windows\System\rXCkxCW.exeC:\Windows\System\rXCkxCW.exe2⤵
-
C:\Windows\System\bAnYxyE.exeC:\Windows\System\bAnYxyE.exe2⤵
-
C:\Windows\System\nzBtXrt.exeC:\Windows\System\nzBtXrt.exe2⤵
-
C:\Windows\System\DjwSLVi.exeC:\Windows\System\DjwSLVi.exe2⤵
-
C:\Windows\System\wKAKODH.exeC:\Windows\System\wKAKODH.exe2⤵
-
C:\Windows\System\FfAzJyb.exeC:\Windows\System\FfAzJyb.exe2⤵
-
C:\Windows\System\HlViEdc.exeC:\Windows\System\HlViEdc.exe2⤵
-
C:\Windows\System\HlZsDxC.exeC:\Windows\System\HlZsDxC.exe2⤵
-
C:\Windows\System\bzNFziS.exeC:\Windows\System\bzNFziS.exe2⤵
-
C:\Windows\System\DScyaXr.exeC:\Windows\System\DScyaXr.exe2⤵
-
C:\Windows\System\ioRgcxi.exeC:\Windows\System\ioRgcxi.exe2⤵
-
C:\Windows\System\iYVbreW.exeC:\Windows\System\iYVbreW.exe2⤵
-
C:\Windows\System\ROhqwDd.exeC:\Windows\System\ROhqwDd.exe2⤵
-
C:\Windows\System\IRKkwsX.exeC:\Windows\System\IRKkwsX.exe2⤵
-
C:\Windows\System\sapepnV.exeC:\Windows\System\sapepnV.exe2⤵
-
C:\Windows\System\ZZhiDns.exeC:\Windows\System\ZZhiDns.exe2⤵
-
C:\Windows\System\tZJNpQG.exeC:\Windows\System\tZJNpQG.exe2⤵
-
C:\Windows\System\rEdEXDL.exeC:\Windows\System\rEdEXDL.exe2⤵
-
C:\Windows\System\nWIgZFr.exeC:\Windows\System\nWIgZFr.exe2⤵
-
C:\Windows\System\QGcwBpN.exeC:\Windows\System\QGcwBpN.exe2⤵
-
C:\Windows\System\CtRtFJl.exeC:\Windows\System\CtRtFJl.exe2⤵
-
C:\Windows\System\OJfpgcE.exeC:\Windows\System\OJfpgcE.exe2⤵
-
C:\Windows\System\GAmPlVt.exeC:\Windows\System\GAmPlVt.exe2⤵
-
C:\Windows\System\rsQgQFp.exeC:\Windows\System\rsQgQFp.exe2⤵
-
C:\Windows\System\WEzjUXz.exeC:\Windows\System\WEzjUXz.exe2⤵
-
C:\Windows\System\xfFKWYy.exeC:\Windows\System\xfFKWYy.exe2⤵
-
C:\Windows\System\VIZERMu.exeC:\Windows\System\VIZERMu.exe2⤵
-
C:\Windows\System\gginVZt.exeC:\Windows\System\gginVZt.exe2⤵
-
C:\Windows\System\KugihFO.exeC:\Windows\System\KugihFO.exe2⤵
-
C:\Windows\System\fdHEqIP.exeC:\Windows\System\fdHEqIP.exe2⤵
-
C:\Windows\System\kdXFWoh.exeC:\Windows\System\kdXFWoh.exe2⤵
-
C:\Windows\System\NMbSdwD.exeC:\Windows\System\NMbSdwD.exe2⤵
-
C:\Windows\System\FfcpFoS.exeC:\Windows\System\FfcpFoS.exe2⤵
-
C:\Windows\System\JOsluYl.exeC:\Windows\System\JOsluYl.exe2⤵
-
C:\Windows\System\LACHRMC.exeC:\Windows\System\LACHRMC.exe2⤵
-
C:\Windows\System\zzvYMNW.exeC:\Windows\System\zzvYMNW.exe2⤵
-
C:\Windows\System\NBjKdVL.exeC:\Windows\System\NBjKdVL.exe2⤵
-
C:\Windows\System\JuqlrKX.exeC:\Windows\System\JuqlrKX.exe2⤵
-
C:\Windows\System\MEhswra.exeC:\Windows\System\MEhswra.exe2⤵
-
C:\Windows\System\mIssLFm.exeC:\Windows\System\mIssLFm.exe2⤵
-
C:\Windows\System\HCEmWfh.exeC:\Windows\System\HCEmWfh.exe2⤵
-
C:\Windows\System\BVDjAQW.exeC:\Windows\System\BVDjAQW.exe2⤵
-
C:\Windows\System\oCscLAI.exeC:\Windows\System\oCscLAI.exe2⤵
-
C:\Windows\System\iLEJggr.exeC:\Windows\System\iLEJggr.exe2⤵
-
C:\Windows\System\Meozbgh.exeC:\Windows\System\Meozbgh.exe2⤵
-
C:\Windows\System\IFzSZQC.exeC:\Windows\System\IFzSZQC.exe2⤵
-
C:\Windows\System\mADZgsj.exeC:\Windows\System\mADZgsj.exe2⤵
-
C:\Windows\System\WtuxEeh.exeC:\Windows\System\WtuxEeh.exe2⤵
-
C:\Windows\System\WABSUAH.exeC:\Windows\System\WABSUAH.exe2⤵
-
C:\Windows\System\QhxywFp.exeC:\Windows\System\QhxywFp.exe2⤵
-
C:\Windows\System\rEebLef.exeC:\Windows\System\rEebLef.exe2⤵
-
C:\Windows\System\cVvZgPf.exeC:\Windows\System\cVvZgPf.exe2⤵
-
C:\Windows\System\aTXRbfw.exeC:\Windows\System\aTXRbfw.exe2⤵
-
C:\Windows\System\nEMCIgZ.exeC:\Windows\System\nEMCIgZ.exe2⤵
-
C:\Windows\System\puhlhVg.exeC:\Windows\System\puhlhVg.exe2⤵
-
C:\Windows\System\GVkiYCU.exeC:\Windows\System\GVkiYCU.exe2⤵
-
C:\Windows\System\CBeaDib.exeC:\Windows\System\CBeaDib.exe2⤵
-
C:\Windows\System\PoDNrev.exeC:\Windows\System\PoDNrev.exe2⤵
-
C:\Windows\System\eFtJMFU.exeC:\Windows\System\eFtJMFU.exe2⤵
-
C:\Windows\System\WKcxpFG.exeC:\Windows\System\WKcxpFG.exe2⤵
-
C:\Windows\System\OGVyNSm.exeC:\Windows\System\OGVyNSm.exe2⤵
-
C:\Windows\System\aFMBifA.exeC:\Windows\System\aFMBifA.exe2⤵
-
C:\Windows\System\uWlzFPR.exeC:\Windows\System\uWlzFPR.exe2⤵
-
C:\Windows\System\CRtRlnX.exeC:\Windows\System\CRtRlnX.exe2⤵
-
C:\Windows\System\xTkckoJ.exeC:\Windows\System\xTkckoJ.exe2⤵
-
C:\Windows\System\FubDbFM.exeC:\Windows\System\FubDbFM.exe2⤵
-
C:\Windows\System\NuhVSFp.exeC:\Windows\System\NuhVSFp.exe2⤵
-
C:\Windows\System\ByHxEmr.exeC:\Windows\System\ByHxEmr.exe2⤵
-
C:\Windows\System\oMHOqKa.exeC:\Windows\System\oMHOqKa.exe2⤵
-
C:\Windows\System\HoxBHYp.exeC:\Windows\System\HoxBHYp.exe2⤵
-
C:\Windows\System\lEBpGlp.exeC:\Windows\System\lEBpGlp.exe2⤵
-
C:\Windows\System\ttatLJN.exeC:\Windows\System\ttatLJN.exe2⤵
-
C:\Windows\System\AmHRpLA.exeC:\Windows\System\AmHRpLA.exe2⤵
-
C:\Windows\System\JHrMMZm.exeC:\Windows\System\JHrMMZm.exe2⤵
-
C:\Windows\System\wYUGYuP.exeC:\Windows\System\wYUGYuP.exe2⤵
-
C:\Windows\System\IpxswQK.exeC:\Windows\System\IpxswQK.exe2⤵
-
C:\Windows\System\vYFXuuE.exeC:\Windows\System\vYFXuuE.exe2⤵
-
C:\Windows\System\FsDxPts.exeC:\Windows\System\FsDxPts.exe2⤵
-
C:\Windows\System\InVCCcQ.exeC:\Windows\System\InVCCcQ.exe2⤵
-
C:\Windows\System\khHRxbK.exeC:\Windows\System\khHRxbK.exe2⤵
-
C:\Windows\System\nFaMFxl.exeC:\Windows\System\nFaMFxl.exe2⤵
-
C:\Windows\System\PoOrzLA.exeC:\Windows\System\PoOrzLA.exe2⤵
-
C:\Windows\System\KBUrKNM.exeC:\Windows\System\KBUrKNM.exe2⤵
-
C:\Windows\System\pASsukt.exeC:\Windows\System\pASsukt.exe2⤵
-
C:\Windows\System\WpupBFk.exeC:\Windows\System\WpupBFk.exe2⤵
-
C:\Windows\System\YIfrbQG.exeC:\Windows\System\YIfrbQG.exe2⤵
-
C:\Windows\System\bXtJAgB.exeC:\Windows\System\bXtJAgB.exe2⤵
-
C:\Windows\System\NaFOxes.exeC:\Windows\System\NaFOxes.exe2⤵
-
C:\Windows\System\sleCYRl.exeC:\Windows\System\sleCYRl.exe2⤵
-
C:\Windows\System\pKwXJmL.exeC:\Windows\System\pKwXJmL.exe2⤵
-
C:\Windows\System\PjsXqno.exeC:\Windows\System\PjsXqno.exe2⤵
-
C:\Windows\System\FGhmuKU.exeC:\Windows\System\FGhmuKU.exe2⤵
-
C:\Windows\System\QmzIzxI.exeC:\Windows\System\QmzIzxI.exe2⤵
-
C:\Windows\System\cSzKthT.exeC:\Windows\System\cSzKthT.exe2⤵
-
C:\Windows\System\mJFaefW.exeC:\Windows\System\mJFaefW.exe2⤵
-
C:\Windows\System\BYRTdia.exeC:\Windows\System\BYRTdia.exe2⤵
-
C:\Windows\System\RmWlnCe.exeC:\Windows\System\RmWlnCe.exe2⤵
-
C:\Windows\System\hudfrka.exeC:\Windows\System\hudfrka.exe2⤵
-
C:\Windows\System\hJJOCFq.exeC:\Windows\System\hJJOCFq.exe2⤵
-
C:\Windows\System\sygkaLW.exeC:\Windows\System\sygkaLW.exe2⤵
-
C:\Windows\System\Ogkhvrr.exeC:\Windows\System\Ogkhvrr.exe2⤵
-
C:\Windows\System\VOlTAZA.exeC:\Windows\System\VOlTAZA.exe2⤵
-
C:\Windows\System\zixXBfQ.exeC:\Windows\System\zixXBfQ.exe2⤵
-
C:\Windows\System\HPntbqb.exeC:\Windows\System\HPntbqb.exe2⤵
-
C:\Windows\System\smtLRKO.exeC:\Windows\System\smtLRKO.exe2⤵
-
C:\Windows\System\zvwVrXh.exeC:\Windows\System\zvwVrXh.exe2⤵
-
C:\Windows\System\lZJanSI.exeC:\Windows\System\lZJanSI.exe2⤵
-
C:\Windows\System\BSccXmY.exeC:\Windows\System\BSccXmY.exe2⤵
-
C:\Windows\System\dssYNDW.exeC:\Windows\System\dssYNDW.exe2⤵
-
C:\Windows\System\vKbJmnn.exeC:\Windows\System\vKbJmnn.exe2⤵
-
C:\Windows\System\BaVORPZ.exeC:\Windows\System\BaVORPZ.exe2⤵
-
C:\Windows\System\iPjWTBf.exeC:\Windows\System\iPjWTBf.exe2⤵
-
C:\Windows\System\GXjVuFv.exeC:\Windows\System\GXjVuFv.exe2⤵
-
C:\Windows\System\yEzcPhc.exeC:\Windows\System\yEzcPhc.exe2⤵
-
C:\Windows\System\OtisaBt.exeC:\Windows\System\OtisaBt.exe2⤵
-
C:\Windows\System\pLfaBbG.exeC:\Windows\System\pLfaBbG.exe2⤵
-
C:\Windows\System\SBATMlz.exeC:\Windows\System\SBATMlz.exe2⤵
-
C:\Windows\System\fyWhaJq.exeC:\Windows\System\fyWhaJq.exe2⤵
-
C:\Windows\System\YEsfSkV.exeC:\Windows\System\YEsfSkV.exe2⤵
-
C:\Windows\System\fnaANsp.exeC:\Windows\System\fnaANsp.exe2⤵
-
C:\Windows\System\sPXjbAB.exeC:\Windows\System\sPXjbAB.exe2⤵
-
C:\Windows\System\ergzvVe.exeC:\Windows\System\ergzvVe.exe2⤵
-
C:\Windows\System\TydwMcE.exeC:\Windows\System\TydwMcE.exe2⤵
-
C:\Windows\System\VmXPZuX.exeC:\Windows\System\VmXPZuX.exe2⤵
-
C:\Windows\System\jeRRrCP.exeC:\Windows\System\jeRRrCP.exe2⤵
-
C:\Windows\System\korFeDU.exeC:\Windows\System\korFeDU.exe2⤵
-
C:\Windows\System\gepKOsa.exeC:\Windows\System\gepKOsa.exe2⤵
-
C:\Windows\System\bzLgfMT.exeC:\Windows\System\bzLgfMT.exe2⤵
-
C:\Windows\System\AAfPBKe.exeC:\Windows\System\AAfPBKe.exe2⤵
-
C:\Windows\System\bqAUqoL.exeC:\Windows\System\bqAUqoL.exe2⤵
-
C:\Windows\System\wlDCJwO.exeC:\Windows\System\wlDCJwO.exe2⤵
-
C:\Windows\System\CVrHTum.exeC:\Windows\System\CVrHTum.exe2⤵
-
C:\Windows\System\qeMvqLC.exeC:\Windows\System\qeMvqLC.exe2⤵
-
C:\Windows\System\yrlycsI.exeC:\Windows\System\yrlycsI.exe2⤵
-
C:\Windows\System\agJzqhA.exeC:\Windows\System\agJzqhA.exe2⤵
-
C:\Windows\System\UPKJfyZ.exeC:\Windows\System\UPKJfyZ.exe2⤵
-
C:\Windows\System\tXGTdwY.exeC:\Windows\System\tXGTdwY.exe2⤵
-
C:\Windows\System\LlenIKR.exeC:\Windows\System\LlenIKR.exe2⤵
-
C:\Windows\System\LKqRLkC.exeC:\Windows\System\LKqRLkC.exe2⤵
-
C:\Windows\System\YbWGCth.exeC:\Windows\System\YbWGCth.exe2⤵
-
C:\Windows\System\OVjpntr.exeC:\Windows\System\OVjpntr.exe2⤵
-
C:\Windows\System\BGvyxiC.exeC:\Windows\System\BGvyxiC.exe2⤵
-
C:\Windows\System\jJBYdgJ.exeC:\Windows\System\jJBYdgJ.exe2⤵
-
C:\Windows\System\MUDwKcA.exeC:\Windows\System\MUDwKcA.exe2⤵
-
C:\Windows\System\hWQBmxG.exeC:\Windows\System\hWQBmxG.exe2⤵
-
C:\Windows\System\aGptNDo.exeC:\Windows\System\aGptNDo.exe2⤵
-
C:\Windows\System\ncXSnKO.exeC:\Windows\System\ncXSnKO.exe2⤵
-
C:\Windows\System\tfMPRlH.exeC:\Windows\System\tfMPRlH.exe2⤵
-
C:\Windows\System\HUtmZir.exeC:\Windows\System\HUtmZir.exe2⤵
-
C:\Windows\System\nObeypJ.exeC:\Windows\System\nObeypJ.exe2⤵
-
C:\Windows\System\RCpKvyL.exeC:\Windows\System\RCpKvyL.exe2⤵
-
C:\Windows\System\eHwRdNN.exeC:\Windows\System\eHwRdNN.exe2⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4168,i,11069752405888604640,8928124405695604965,262144 --variations-seed-version --mojo-platform-channel-handle=3908 /prefetch:81⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SendNotifyMessage
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\LH3V79HX\microsoft.windows[1].xmlFilesize
97B
MD5de1306e442e8f8a902d2623363175928
SHA1d5b28352c742e56b522112dbea4b9dd50bb26721
SHA25634f21a5c66749b3afe1a5f2a9fbfb0b34084c19cd7b576ef854778b795bc1af8
SHA512b727a28ac0640130790fd0bc43229dec8c1e8ec3170131ab7434339dc6171f5a5c6c31276439354f203bbb42b37d8771fbd991cc280acef4e0756acc161a926d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133627597084804078.txtFilesize
75KB
MD5ec861d1b31e9e99a4a6548f1e0b504e1
SHA18bf1243597aba54793caf29c5e6c258507f15652
SHA2569dcf45126bd51fcc0ef73e54cc07f8eec145bc17eef189acd15fba199972d7da
SHA51230cf8103a2043fd7b1a54ce06ff2ca14ba382040297a177fc612bcf55878f9d0abbe3f7ea0e7be6b6981f7c67f8be09d77730670365af3d52a1e25640a224ffd
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_er2fqpr5.u20.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\System\CgNEims.exeFilesize
1.6MB
MD593b9a193b4e6a21004b27cd06aa61d9f
SHA17de158f65a4641a278daa2054b00201b1ee4a1cd
SHA256d5be5525e02f6d4085f74968d2499c8fa3294575a0c349aa311dfaf7b8be2eb0
SHA5126d8ed6f995295254e09a1876e45ce6307c8ae694330b5937f7d9aa25c1eba54e1a0cd0a6111f2be42f4bdf367a3cb08ac036200ffdb70885196cc8f19e8c1dd4
-
C:\Windows\System\HwmblCG.exeFilesize
1.6MB
MD515ae6b6924d1775ccbccd53f2f744abe
SHA18538e34967e4619f1e0b5e5927725a945f99dfcb
SHA2563af467007e7ee8abf409097161c4601ccb78cb5aa730a010598e85952cd949a6
SHA51279a456fbe975df81a11ad0a04c570e0b1cd648d17df5d7fc300b638b7df4fcc756a4700fc07c2809ff136ba1a53f0bceae5dca4daef2581d0775833be67c994a
-
C:\Windows\System\IPOwzGT.exeFilesize
1.6MB
MD5bcdf6b3cc67d0999a80df63d8320123e
SHA1407fd5522fb9e7f2d41d3d4c8f3c07116a14ad0e
SHA256cebe67f68e6e9f3b6865a1e3e6309fc05dc36dbc1dc2bf83525c50a2b6a1f750
SHA5122fa341fbf5fa8ca1904c1e4eaf6af79b23cc447ca1d3b022ace0a79ca3abab93604c23bdc2dbd58c2717a862d95000071aaaa79281cd867b4a2a2e60fd9512bd
-
C:\Windows\System\PtHygGf.exeFilesize
1.6MB
MD55165eafb8a7475f48765581e0e4891b7
SHA1fef4ca84515233576a34dbd378bddfbad87b696e
SHA256f8eb1b93d5a169e242b27e66d5d495d9c96ab4782da9a15c221d66b97a7f0c3d
SHA51273329d0fcd9f4edb80d5199ffcaae30d167e5c35190296d19eef7e1eee40d4247126f25181d1f041b715e30faf412b0a91b506be7c68b6564215f92e81aabf00
-
C:\Windows\System\QjGQrCH.exeFilesize
1.6MB
MD57112b97f5f7177a9eac4b85f6b82d07b
SHA170a60c41631eeba346ba4f36193db52a4f583425
SHA2560d9ac015be55bafcea5d3e42662f2b36e695296e7266d658fb6f8e5a8db0600a
SHA5124aee4ee7be5bf3b1302593271808967a91617f567849ac5b7f06209367f3b95f2c7da0e7fd86f3fbd6b606a8bcf5e11082991d791eb11dbf2955811eab9ea9c2
-
C:\Windows\System\RCUfeaX.exeFilesize
1.6MB
MD54da69e9bfd31d0dd7f1e8025e61b1d34
SHA14f70dca9e82da6169a35dcd5379c42225abcb389
SHA256aa8fa9a5c91f6953bf963ae9476988858ca5803a8e2a92cdf453b6b26a40b7c3
SHA5127a6223a78a6b5dd868c9d851c5a7a5556f5e0b9161db7b9497175c33f23a84930921ba7d20cb9fb59163da80a7759e5272cf15ea378b3e94da4835b624406072
-
C:\Windows\System\RdEdqzy.exeFilesize
1.6MB
MD51df8aa20e2a5ce6eb8194359e050628e
SHA1ac79160b23294079d59a0f65ec3d06841d79871f
SHA256230b6f3458a9e0ebf4f3d63080866d1c9cfdf0d8aee38a61c88d9418b7c93f3c
SHA5129e5bf52391347bbf2905c4ffad94e5809eed849bc7f207366183866e7c4210d3eb4e424f2e2dd641be78cd77caef323253ccaeba1f02fe96584cde6df42f884e
-
C:\Windows\System\SUoppDE.exeFilesize
1.6MB
MD5d9c755ca9c6acaa454a20a8cfc3e927c
SHA1a0ee5e02425909e93a39b43a4d774dbd2e54c95a
SHA2566cd1435b26f6c9196e30493927c00cd9e12401a2531a6e515231c0b0d9e55371
SHA51277d440a75bccab112585a4b69516999ef01dc93786fa4618bc8964b931da753461db74dd698352ee4e5b87e84bfc13b08d39f77e946abc846b9286b8ac3ff1b9
-
C:\Windows\System\VSsDrNE.exeFilesize
1.6MB
MD520c0b338ae7c4b9d020446d977f9f513
SHA10249d7872b169340c01a641d130ff9e09d7b27dc
SHA25638a34391cf01d5dbd19c159ed223bfe13ec0874cfd467deae6b55e103594fd41
SHA5126082eed77a649a89e2b4e276bc02cba10fb5c7b45ab939991b0eb2578e2e4bd50843dd151f7ff37d43993819373d996f81ae5e3c21700e36f8579b4fd94a54d7
-
C:\Windows\System\XQTtzST.exeFilesize
1.6MB
MD578e06e73e5e9b88e67dc65b53cd5df66
SHA15598ebaf65f3bd5af63848d09ae93147f779a101
SHA256c41155dbe5fdddef58e2f38c884738a24667c5b9a24d90abc87084309e61fdc9
SHA512aee27a7aa13df6bc93b7581f32979d6345083f401c2293a3dc1efe274377ca71566c08520acc8b34f5d336c1c8f16fe2b7942f8c5174a5be32571172d95ae71e
-
C:\Windows\System\YrINZoJ.exeFilesize
1.6MB
MD5e5faa2685e6e8198cc05a86824b84659
SHA1cf672859b51fcf6c099397afa6143481f22872f8
SHA25678048d53ad39e64bb1d31f6228f9f62dfd7f76b0bd46307ad0815e494a778de4
SHA5128eb16c0fc088eca8da8e1c5c1c8e809895462662f6b07030f39ece60bf9136a7938b1561903832cdf6a916b1b05efddcd313b878f4d9373eb20a24fb7c11454b
-
C:\Windows\System\aTwTwnd.exeFilesize
1.6MB
MD55f8b0fcaf78d69f79f15afdd54fb82f5
SHA1fc9046a507dbcfad34269740b91d4f0c29aae297
SHA256e69dd0b1f518aeb705ebe8907176c1dc955387d9d51c1f18b9b6e7c54e4b393b
SHA512186269b6b7efa29870229b4b104333833cbcdf0c5ad65f7cf327b6ff0645abd3f8bd4ddce031657aaeeb68fcfb79c577228a87105662e6e2412d31c07cf4bc93
-
C:\Windows\System\apclgLI.exeFilesize
1.6MB
MD55bdd0d80683b9d43bbf4b1ef60e9b686
SHA1e1f7aba3e065485174ae4859e9d0ce0e9ec1195b
SHA256ac14b9b8704fc18a3e847787fb874ef929c88bfc4744aab329010e46a20537e6
SHA51253cf554cce4b1d0e376caf356a11856ab29a62df32483be849cf0657e913a176506065c4aaa3455ee91ade959a50c7b932b08486eee7c4e25beb2b6e9a83ec6f
-
C:\Windows\System\ccVncHe.exeFilesize
1.6MB
MD5ad0ff80f435612b634c5952426ff74c2
SHA119c3be15bbb169a35dbed495f38fed673e0262be
SHA256843fb018763aa01b73f17bc03384a0d1b8349bb397bbc30faf6d63c79fbd174a
SHA5122c4e182e279648c6e47e2f6f2ef09a879d1ca32f0824e448b805f77b4f29279df907fb4e4cc4a854582d34fb38c822ee9598ed7395f256b58e3ed60c71ec3b9e
-
C:\Windows\System\fTTgQna.exeFilesize
1.6MB
MD5ee5aac64e82eb916887adfb7a90d7903
SHA1b7f6f114e65c6e180b64787eb06dd93f86fb8ab0
SHA2567cc3205ed17dbd641d9cf8ca2b33752b927cb4288587a0f4a979529f19dd8510
SHA512ad601cae619d6ecb7b9b7d59bdc28c3293478c4de74e5f84d31468c32554a512552b17bc57c4a10a38ac388eecb952bed3e3f48c0972d40024d4c8ed28eb22bf
-
C:\Windows\System\ftUyhaz.exeFilesize
1.6MB
MD57d06788397cd2abad3526d68dd09f4ae
SHA1954e98801bafdac9b2978dee2227aecef3abb8b7
SHA256ebdcc266158a00c7c32efa137012fd6f9b3c910e9d864cadecb9b7d580f14aa5
SHA512eb84b413ae863f8182ee8430967c17ce34ec3eef204547fc87530c819cad491f387a00b4adeacdf2a198459b65d3b06f512e56344a3b6868de44d38a7972b868
-
C:\Windows\System\hiotGkt.exeFilesize
1.6MB
MD5c91ec06d57aa6aea5bdce064e1a6b898
SHA1b326ce68d9579fd32bb977928856b92b1a1a9ef2
SHA25689c78c889f03e0a0850746646bccde4bb2ad6ae025c44531959b17af856404a7
SHA51275ba216b96c130ca19176d3ae28afd48333c03fc53e407173003a4862f36a2865a015127a23aee690c493c6e0b3f9d7a25188d2979d7fd569e5c93f26115971e
-
C:\Windows\System\jzIopth.exeFilesize
1.6MB
MD5abb3b8c9cb5c3cc779b19078098ab96b
SHA1c0e4f6fe18f359b5a21e03f5b29c1be4bfdb8f71
SHA256264ba523a53d0932389e0a598386f61917f99f4901fdf770fa0a80f4b8066dca
SHA51283c0a6b440fc24419ed22f4042b68b424dc73d5a8e99292388947bbbc3e2533f373db3d925e48038bfc8ea5b699b2e65bc0e3b08665d619c11257bc6b3d9012f
-
C:\Windows\System\lFbNZEF.exeFilesize
1.6MB
MD551bffacfd5d1d011b1da591ce8771720
SHA16a8b8bf3b3a744719d09add896b3c31c660c6a16
SHA2560473da583075a14bab9788f1342ce8d4207f4edbfaea0b889ad6a0fb8fbffb26
SHA5121436d3129b1bc950d0f58a62bd84e04fd63f1161ea922f0ad6cbe036b9af42ca947cab3df83f74c5ecd81daa41e25ae637342cd33318538dee4774e8bb09d6a1
-
C:\Windows\System\lTfPfop.exeFilesize
1.6MB
MD59e5e32797deb7fb39a81057f8128c095
SHA148ecf0378e9e0bdbd7b494f388b6b8f88401fd14
SHA25663f68012c72693fbba0efc0734140c713d55def26218ff033a9561be9664b73d
SHA5126369cbb0e5fda63e4127c2d100bd0b85eaa1176cb86db7b0b5f2ce5c3dfa357e034d6031a227ca075ed3fbd630b98d59b5008863dd86522a2f4f9cfe8c8e4448
-
C:\Windows\System\laaHjvu.exeFilesize
1.6MB
MD5af2ce6343e2e2447df8512a45b9d3b9d
SHA149f961b83a6394cf7def498c6423d8d0620211f0
SHA256664cee42f98c6deb306aa02f4c1a6aad66243d945c855342a6a61c168cf33998
SHA512a00898e60d0444091862bb4a27aaa25b8af5d8fe059d2f1b1aab543118bc246383fbf26e59b9ccef54c8a8b17a270696c1989cf6d92141c9fc565dc3ffd9dbe0
-
C:\Windows\System\mbFMNHX.exeFilesize
1.6MB
MD546d8120e1016cd1f3fbf07035727c46c
SHA1fd3a3f13b127a2ed0abb59ea7497825757988c81
SHA25627b4e93a89cd59a1e919f0bae050c1e8009f51be278ed9881cbc657a97b21e7f
SHA512fb8facc438fd87d2c59cbb17fba1660e2446a06b8958c57bb32da9ad70e838f1cc86932656911749f5665092218b11c1a9900e907a64f6377a048b5e8d5183d0
-
C:\Windows\System\okpqglc.exeFilesize
1.6MB
MD57032f1ca25f414ae375f81f2574d8752
SHA158b34a86509722f727764ab5de4eb8e7de9a2a1e
SHA256c672e495087fed5de3dbcf5b171d5ccd2b66bb9b1fc659d2b69836a4af59f630
SHA5126f11740995111cf512ae0ab9c848dc2400f56c5b9ba396606fc530403ea519701483de286cb31a7cfd61f38dd7f9c511f09a14649aa6a2124327a793fd715e74
-
C:\Windows\System\pEmheoo.exeFilesize
1.6MB
MD57937d87bcb11e592797286883c2f6dad
SHA1bb38fc6aff83430f5861238ce77adc4b0d75db70
SHA256cdc4dde80a14ad1341bad29a4085d3589ce8660d8fb0d25b76762705d013a6fd
SHA5123b230033b82a7bc4812dd2691c79fe5b891e67d8befa3acdf0011d11e43e122b0292c6de8c7b3b15ce412eb744efe0e5690a3f34e5152380b4b7207261e14df5
-
C:\Windows\System\rtfeKkF.exeFilesize
1.6MB
MD545be6b737903a6e0423c7a58dace0002
SHA140129ef1cf8a29d880b6bc457f34de967c2a7054
SHA256d254095ef94e5a1c2efe9a26f70bab7ebfa72319a94d35cc7712e91cebc7da6e
SHA5124138b0643842444d03af6d57818e57d7ced6561be114b62f5e479e024a37dc9a19bd42a83dedcdcd130801d320ba1bd0faf7bea51877f743856bb75fa422f603
-
C:\Windows\System\sFVTSRL.exeFilesize
1.6MB
MD53667b976d33a0f178de62c9af59955a6
SHA1091ac50887b947f2b0a9f697a832a0f1b8f610f2
SHA256c7f4bf45bce1a38f702205870f4bc97a92a9df2920ff65270b7848d8c1126edb
SHA5126e597ca4799e775c2d74e2033525fd4c6adf486993e2d824edcfc9f32c579cbc8f5e85719c8078eaae3867380647f4a238666fd1c0be29b2acbf46015b9ade7c
-
C:\Windows\System\tYQDfah.exeFilesize
1.6MB
MD574095ede78cd680cc9f5fd877098ddd3
SHA14eb131b69abc184dd7e16415ed20e4da74d88c31
SHA256e54ebba1b2ba46fdb8ce44db1c16f7d7b82969f5d8e627c15d55cf11c22a6f7e
SHA512566d4163ec3f65223582536293220eb382af8dba3043d8b051dba1f25827cb39ab4222ff177a97278a7756c032d597678643656b013f6d85621b0a0ad7fbb4bc
-
C:\Windows\System\vKdbnhm.exeFilesize
1.6MB
MD5d4ecb9110b28a90938e95935fc2b9845
SHA1d6dc95100e71f0e89c06e5bbe90e89e46d6e7039
SHA25675cc920ace9a931d92859c5b401688ba9f9dc8b1c1ce270c5cf86637366348a0
SHA5127a085377a4824481d6de4d780f42fbb8160982e93239eaf954ad03625c49e57cdab8a3d613e2315e52bf844e7b77028a98e741983a3e0ad6ca1a96ae80c81649
-
C:\Windows\System\vXzWkaT.exeFilesize
1.6MB
MD5176773fbbf5dce90013c293b3aa739bb
SHA1debe0c7b86595d38ae2a6759d0da0b1edaee578a
SHA256c4961c992a1d05d9e1ca2b188677d3e5c69e8a2979137c32605cceb20eb66e3b
SHA512e378b6fad3d8288243519d78b59770a242a49c668b942deae1c78036faa711bd7ebf44089140eb51767d732f90452c34dd1b965b080b53e00907ec63e7364f18
-
C:\Windows\System\wDYTMdV.exeFilesize
8B
MD567d893d1a2095d39d451d08ee1cc05e9
SHA1dad7ef4487e41ff3c3e600250e691ed16832dc94
SHA256cc871666e89dd430f5e3dc9cc361cd1a4ecf7214b4b8daeb86cca2257079f3ce
SHA5127799e4db272ac6c136cb55f2e50c1582a5027767dc6d148dbf159fdb6f776a047cf2ac573fbb2f2ca5a994173cf0465c93ef3f6e6c86e8981136e854def9801d
-
C:\Windows\System\xPvWnKI.exeFilesize
1.6MB
MD5026575b569a901f88826e8a29e815ed9
SHA163e1050499bab7f0bdb811a631a7176a6676ce82
SHA2564127a459046356f0bb3f3b27c49cbf093e89e22dc47b80a7dbf8ff7899a7b895
SHA512020b85243fa9f5306ed3131b392bb743b70646ecbf05e374dd7c909f3f2c49c32271c42c123bd6567c9a8c11cc0b89eec24164fbdcbf113159452382112bb590
-
C:\Windows\System\zYhdmZi.exeFilesize
1.6MB
MD55ac3cd7f87a29fb208e719902246a6de
SHA1e5fb24e681c6a81520aaede85d5ae4aabd216a05
SHA256eda7dd1a6fc0ad6acb563f13a63ea1f3d79714fa62524e49ecf3656e95530df6
SHA512ab77ff72f1a08b94e63c01551a3e71e043eb3ac1a0c334e9e50c6f46c01f670d37b63afe9d8cd2d016152af158e392c9d407365c4eeee532e3fe4d55afea70b2
-
C:\Windows\System\zaiqPaj.exeFilesize
1.6MB
MD5601abe3e9c6506773c4e3b9f0fd1a37d
SHA1fc8a89f95f5055b82b958ae55e31977e48f6a42d
SHA25675f43fd830da9dfafac13cabf6a9fd15099a3e6fb3918d55010b007d99bd96b6
SHA512b2405b33e683740dc86f0c0f72d5880235252c4b44daa8e303f8c53091688451399a5961840166e24b63b8d885cabf06b0406f8b310e0a83125350a989c99a3d
-
C:\Windows\System\zjvilka.exeFilesize
1.6MB
MD5852e6c8ee1ef6ca72d530de3a3e65c27
SHA1fb8e61b51b7580a5bf494744bd8054f2320da977
SHA2564f8581b871e0b198ca2abf2b5234162bbc66eab8d5efc889f7b49ebd63ed349d
SHA512d4c7d0e4eb428a2f3d2ad260f106d67113e2683bb41d359974f2545a57af7654f8dcbdab278924888ba2cb0e5892aa5ab45a85303fa319149a0c9c81d069ef7d
-
memory/60-3681-0x00007FF78DE10000-0x00007FF78E202000-memory.dmpFilesize
3.9MB
-
memory/60-376-0x00007FF78DE10000-0x00007FF78E202000-memory.dmpFilesize
3.9MB
-
memory/788-3699-0x00007FF7E2220000-0x00007FF7E2612000-memory.dmpFilesize
3.9MB
-
memory/788-380-0x00007FF7E2220000-0x00007FF7E2612000-memory.dmpFilesize
3.9MB
-
memory/960-3679-0x00007FF721660000-0x00007FF721A52000-memory.dmpFilesize
3.9MB
-
memory/960-375-0x00007FF721660000-0x00007FF721A52000-memory.dmpFilesize
3.9MB
-
memory/1444-3702-0x00007FF7AA510000-0x00007FF7AA902000-memory.dmpFilesize
3.9MB
-
memory/1444-382-0x00007FF7AA510000-0x00007FF7AA902000-memory.dmpFilesize
3.9MB
-
memory/1928-372-0x00007FF79CB60000-0x00007FF79CF52000-memory.dmpFilesize
3.9MB
-
memory/1928-3671-0x00007FF79CB60000-0x00007FF79CF52000-memory.dmpFilesize
3.9MB
-
memory/1948-370-0x00007FF780B30000-0x00007FF780F22000-memory.dmpFilesize
3.9MB
-
memory/1948-3634-0x00007FF780B30000-0x00007FF780F22000-memory.dmpFilesize
3.9MB
-
memory/1976-75-0x00007FF731BA0000-0x00007FF731F92000-memory.dmpFilesize
3.9MB
-
memory/1976-3628-0x00007FF731BA0000-0x00007FF731F92000-memory.dmpFilesize
3.9MB
-
memory/2016-3635-0x00007FF6289F0000-0x00007FF628DE2000-memory.dmpFilesize
3.9MB
-
memory/2016-368-0x00007FF6289F0000-0x00007FF628DE2000-memory.dmpFilesize
3.9MB
-
memory/2664-3687-0x00007FF6B0EE0000-0x00007FF6B12D2000-memory.dmpFilesize
3.9MB
-
memory/2664-379-0x00007FF6B0EE0000-0x00007FF6B12D2000-memory.dmpFilesize
3.9MB
-
memory/2948-373-0x00007FF674EC0000-0x00007FF6752B2000-memory.dmpFilesize
3.9MB
-
memory/2948-3675-0x00007FF674EC0000-0x00007FF6752B2000-memory.dmpFilesize
3.9MB
-
memory/2956-3683-0x00007FF7BD750000-0x00007FF7BDB42000-memory.dmpFilesize
3.9MB
-
memory/2956-377-0x00007FF7BD750000-0x00007FF7BDB42000-memory.dmpFilesize
3.9MB
-
memory/2960-374-0x00007FF63A600000-0x00007FF63A9F2000-memory.dmpFilesize
3.9MB
-
memory/2960-3677-0x00007FF63A600000-0x00007FF63A9F2000-memory.dmpFilesize
3.9MB
-
memory/3160-371-0x00007FF7261D0000-0x00007FF7265C2000-memory.dmpFilesize
3.9MB
-
memory/3160-3642-0x00007FF7261D0000-0x00007FF7265C2000-memory.dmpFilesize
3.9MB
-
memory/3316-386-0x00007FF79BBB0000-0x00007FF79BFA2000-memory.dmpFilesize
3.9MB
-
memory/3316-3673-0x00007FF79BBB0000-0x00007FF79BFA2000-memory.dmpFilesize
3.9MB
-
memory/3428-33-0x00007FF6D5EE0000-0x00007FF6D62D2000-memory.dmpFilesize
3.9MB
-
memory/3428-3629-0x00007FF6D5EE0000-0x00007FF6D62D2000-memory.dmpFilesize
3.9MB
-
memory/3700-15-0x00007FF6FF220000-0x00007FF6FF612000-memory.dmpFilesize
3.9MB
-
memory/3700-3625-0x00007FF6FF220000-0x00007FF6FF612000-memory.dmpFilesize
3.9MB
-
memory/3724-3685-0x00007FF64DD60000-0x00007FF64E152000-memory.dmpFilesize
3.9MB
-
memory/3724-378-0x00007FF64DD60000-0x00007FF64E152000-memory.dmpFilesize
3.9MB
-
memory/3756-3705-0x00007FF717650000-0x00007FF717A42000-memory.dmpFilesize
3.9MB
-
memory/3756-383-0x00007FF717650000-0x00007FF717A42000-memory.dmpFilesize
3.9MB
-
memory/3920-384-0x00007FF786360000-0x00007FF786752000-memory.dmpFilesize
3.9MB
-
memory/3920-3643-0x00007FF786360000-0x00007FF786752000-memory.dmpFilesize
3.9MB
-
memory/4108-0-0x00007FF74F010000-0x00007FF74F402000-memory.dmpFilesize
3.9MB
-
memory/4108-1-0x0000024299BD0000-0x0000024299BE0000-memory.dmpFilesize
64KB
-
memory/4184-3639-0x00007FF6D1800000-0x00007FF6D1BF2000-memory.dmpFilesize
3.9MB
-
memory/4184-39-0x00007FF6D1800000-0x00007FF6D1BF2000-memory.dmpFilesize
3.9MB
-
memory/4184-3465-0x00007FF6D1800000-0x00007FF6D1BF2000-memory.dmpFilesize
3.9MB
-
memory/4404-3624-0x00007FF67D820000-0x00007FF67DC12000-memory.dmpFilesize
3.9MB
-
memory/4404-22-0x00007FF67D820000-0x00007FF67DC12000-memory.dmpFilesize
3.9MB
-
memory/4716-3637-0x00007FF6B1220000-0x00007FF6B1612000-memory.dmpFilesize
3.9MB
-
memory/4716-385-0x00007FF6B1220000-0x00007FF6B1612000-memory.dmpFilesize
3.9MB
-
memory/4856-3631-0x00007FF777C70000-0x00007FF778062000-memory.dmpFilesize
3.9MB
-
memory/4856-76-0x00007FF777C70000-0x00007FF778062000-memory.dmpFilesize
3.9MB
-
memory/4880-3703-0x00007FF713260000-0x00007FF713652000-memory.dmpFilesize
3.9MB
-
memory/4880-381-0x00007FF713260000-0x00007FF713652000-memory.dmpFilesize
3.9MB
-
memory/5000-58-0x000001B579FD0000-0x000001B579FF2000-memory.dmpFilesize
136KB
-
memory/5000-367-0x000001B57ACE0000-0x000001B57B486000-memory.dmpFilesize
7.6MB