Analysis
-
max time kernel
150s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea_NeikiAnalytics.exe
-
Size
448KB
-
MD5
411d99f96aeb1b8a9045ecfd09934500
-
SHA1
c3498c5574510934a229ef799caa4424a39a364d
-
SHA256
163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea
-
SHA512
639dbd6ff08c993f87b4263cd14c591e3de896be2df20dfc7b0664e15b998457191ead30eb424e0a91e465fee3cfd5db9ec2c8043a7c6560879c5e3044cdad86
-
SSDEEP
6144:ltO9U78I7Zqa+f+57Yl8nSC27+kEjWbjcSbcY+CaQdaFOY4iGFYtR:ltB893qFnSC27+kFbz+xt4vF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation QVMA.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation JFTCA.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation SUJB.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation OKD.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation BKUCW.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ULIDW.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation QGM.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation QMRCNP.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation RKD.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation MAGGVG.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation OMHXAY.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation CWWTGKQ.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ELJUJV.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation YTWGG.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation CZXN.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ICJLD.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation HSHHG.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation YXDX.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation QXCVOSU.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation XJAODW.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WJTAOWI.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation UYMAKDU.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation TRJF.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation KKE.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation BPLO.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation YKVURI.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation PPCUB.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ELPCVV.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation UUFWQ.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation YBANZ.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation HFFCTN.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation CTLNMG.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation BMNVV.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation FXYYNUL.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation MOBDLP.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation SMZ.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ZYXYUQB.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation KCN.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation HPB.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation OBAWNJQ.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation DRRS.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation GNME.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ISOXLLV.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation MLYZXH.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation GDWDXP.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation CUM.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation AAZQRNG.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation PBYI.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation MPVHTWE.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation AOXW.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation BVIEW.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation FPGPB.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation CONPNBW.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation UFIDA.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation CUA.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation LOG.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation YFXKH.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation PKYQKI.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation RPAWJN.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EIXSJH.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation QGA.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation VWS.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation SJC.exe -
Executes dropped EXE 64 IoCs
pid Process 2088 AJNAFZ.exe 5096 VWS.exe 4676 CZXN.exe 3724 RFVKPF.exe 2620 BVIEW.exe 2168 UYMAKDU.exe 1680 SJPQKR.exe 2940 EBSISZG.exe 1928 QRYQF.exe 2540 YXDX.exe 1284 HFFCTN.exe 2260 WAWH.exe 404 SGJKPF.exe 1220 YBU.exe 1748 AROGBQ.exe 2104 PUXS.exe 1236 HPB.exe 372 ZXDB.exe 2496 BKUCW.exe 3208 YLEF.exe 1952 CTLNMG.exe 4188 BMNVV.exe 3180 LKTPC.exe 4556 FXYYNUL.exe 3424 NCKFXT.exe 2392 RSRN.exe 1512 QDU.exe 1840 ULIDW.exe 864 AHAEBM.exe 644 JUKW.exe 4280 NXIRRCT.exe 932 XVWL.exe 2104 ZSCG.exe 4524 UDSWCE.exe 2356 TRJF.exe 1888 OBAWNJQ.exe 4508 SRGEZ.exe 4336 FPGPB.exe 1144 JXN.exe 3956 CYC.exe 8 ILB.exe 3808 YOLOUO.exe 3724 LMLZW.exe 1652 KKE.exe 1388 ONCPRY.exe 4404 BPLO.exe 2532 QGM.exe 4540 YTYMODI.exe 4872 IREGELR.exe 3100 KPSB.exe 1960 YKVURI.exe 4820 NHBRGS.exe 2680 GIQCQT.exe 2444 BVVLATG.exe 1468 FDCTE.exe 4404 SJC.exe 3728 NUS.exe 4328 PKYQKI.exe 3368 HSAV.exe 4248 YAOA.exe 4916 YGHPB.exe 1952 CONPNBW.exe 3524 DRRS.exe 4088 NPFF.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\windows\SysWOW64\EBSISZG.exe SJPQKR.exe File created C:\windows\SysWOW64\SJC.exe FDCTE.exe File created C:\windows\SysWOW64\QSGP.exe PPCUB.exe File created C:\windows\SysWOW64\JTG.exe.bat AFVRD.exe File created C:\windows\SysWOW64\RLLRKKF.exe LPZ.exe File created C:\windows\SysWOW64\BVIEW.exe.bat RFVKPF.exe File created C:\windows\SysWOW64\QGM.exe.bat BPLO.exe File created C:\windows\SysWOW64\QSGP.exe.bat PPCUB.exe File opened for modification C:\windows\SysWOW64\NWEETU.exe JTG.exe File created C:\windows\SysWOW64\ZHGIK.exe.bat XJAODW.exe File created C:\windows\SysWOW64\VZNUYBZ.exe.bat IWCHPW.exe File opened for modification C:\windows\SysWOW64\RSRN.exe NCKFXT.exe File opened for modification C:\windows\SysWOW64\OBAWNJQ.exe TRJF.exe File created C:\windows\SysWOW64\YKVURI.exe KPSB.exe File opened for modification C:\windows\SysWOW64\NHBRGS.exe YKVURI.exe File created C:\windows\SysWOW64\GIQCQT.exe NHBRGS.exe File created C:\windows\SysWOW64\MOBDLP.exe IGUD.exe File created C:\windows\SysWOW64\OMHXAY.exe.bat MOBDLP.exe File created C:\windows\SysWOW64\QXCVOSU.exe SMZ.exe File opened for modification C:\windows\SysWOW64\XSCDFS.exe TCV.exe File created C:\windows\SysWOW64\YVG.exe XSCDFS.exe File created C:\windows\SysWOW64\UYMAKDU.exe.bat BVIEW.exe File created C:\windows\SysWOW64\BMNVV.exe CTLNMG.exe File created C:\windows\SysWOW64\RSRN.exe.bat NCKFXT.exe File created C:\windows\SysWOW64\BPLO.exe.bat ONCPRY.exe File created C:\windows\SysWOW64\KPSB.exe IREGELR.exe File created C:\windows\SysWOW64\CUA.exe IHWKRBD.exe File opened for modification C:\windows\SysWOW64\BVIEW.exe RFVKPF.exe File opened for modification C:\windows\SysWOW64\YKVURI.exe KPSB.exe File opened for modification C:\windows\SysWOW64\GIQCQT.exe NHBRGS.exe File created C:\windows\SysWOW64\ISOXLLV.exe.bat ECIPZTZ.exe File created C:\windows\SysWOW64\IHWKRBD.exe.bat OOOZZA.exe File opened for modification C:\windows\SysWOW64\GFNVP.exe RKD.exe File created C:\windows\SysWOW64\SJDTYYJ.exe LOG.exe File created C:\windows\SysWOW64\ZHGIK.exe XJAODW.exe File created C:\windows\SysWOW64\AAZQRNG.exe JPO.exe File created C:\windows\SysWOW64\CZXN.exe VWS.exe File opened for modification C:\windows\SysWOW64\CZXN.exe VWS.exe File created C:\windows\SysWOW64\BPLO.exe ONCPRY.exe File created C:\windows\SysWOW64\SOEOVWM.exe OYYOJ.exe File created C:\windows\SysWOW64\BBFNFH.exe.bat DRWIAO.exe File created C:\windows\SysWOW64\AAZQRNG.exe.bat JPO.exe File created C:\windows\SysWOW64\EBSISZG.exe.bat SJPQKR.exe File created C:\windows\SysWOW64\QYGE.exe.bat QSGP.exe File opened for modification C:\windows\SysWOW64\UYMAKDU.exe BVIEW.exe File created C:\windows\SysWOW64\PPCUB.exe.bat RPVGS.exe File created C:\windows\SysWOW64\QYGE.exe QSGP.exe File created C:\windows\SysWOW64\GFNVP.exe.bat RKD.exe File opened for modification C:\windows\SysWOW64\SJDTYYJ.exe LOG.exe File opened for modification C:\windows\SysWOW64\GLWQ.exe YFXKH.exe File opened for modification C:\windows\SysWOW64\PBYI.exe VARX.exe File created C:\windows\SysWOW64\NWEETU.exe JTG.exe File created C:\windows\SysWOW64\ECIPZTZ.exe.bat OMHXAY.exe File opened for modification C:\windows\SysWOW64\MLYZXH.exe ISOXLLV.exe File created C:\windows\SysWOW64\SOEOVWM.exe.bat OYYOJ.exe File created C:\windows\SysWOW64\FLFL.exe OKD.exe File opened for modification C:\windows\SysWOW64\ZSCG.exe XVWL.exe File opened for modification C:\windows\SysWOW64\DBI.exe MAGGVG.exe File created C:\windows\SysWOW64\XCT.exe.bat JFTCA.exe File created C:\windows\SysWOW64\CTLNMG.exe.bat YLEF.exe File created C:\windows\SysWOW64\NXIRRCT.exe JUKW.exe File created C:\windows\SysWOW64\KKE.exe LMLZW.exe File opened for modification C:\windows\SysWOW64\QXCVOSU.exe SMZ.exe File created C:\windows\SysWOW64\LOG.exe.bat BQOV.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\system\YBANZ.exe.bat PBYI.exe File created C:\windows\YTWGG.exe.bat GQTC.exe File created C:\windows\system\DUXDAOR.exe FHXCVL.exe File created C:\windows\QGA.exe AQZSL.exe File created C:\windows\system\TCV.exe WJTAOWI.exe File created C:\windows\system\OYYOJ.exe.bat UFIDA.exe File opened for modification C:\windows\NCJB.exe HBCOKKP.exe File created C:\windows\system\YUVXHZ.exe JEUYBDB.exe File opened for modification C:\windows\system\JXN.exe FPGPB.exe File opened for modification C:\windows\BVVLATG.exe GIQCQT.exe File opened for modification C:\windows\system\UFIDA.exe QXCVOSU.exe File created C:\windows\system\GQTC.exe.bat HSHHG.exe File created C:\windows\system\ZXDB.exe HPB.exe File created C:\windows\system\JXN.exe FPGPB.exe File created C:\windows\JEUYBDB.exe.bat IBQCV.exe File opened for modification C:\windows\WAWH.exe HFFCTN.exe File created C:\windows\ULT.exe.bat QVMA.exe File created C:\windows\system\OKD.exe.bat RFTRFLB.exe File created C:\windows\UDSWCE.exe.bat ZSCG.exe File created C:\windows\system\MAIV.exe.bat RPAWJN.exe File created C:\windows\system\FAEMUHZ.exe.bat MHXBDGJ.exe File opened for modification C:\windows\FSIIOQ.exe NPFF.exe File created C:\windows\NHYH.exe.bat EGW.exe File opened for modification C:\windows\system\IPTT.exe SZK.exe File created C:\windows\system\BQOV.exe GDWDXP.exe File opened for modification C:\windows\NNI.exe PXXHW.exe File created C:\windows\system\AJNAFZ.exe.bat 163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea_NeikiAnalytics.exe File created C:\windows\system\SJPQKR.exe.bat UYMAKDU.exe File opened for modification C:\windows\AROGBQ.exe YBU.exe File created C:\windows\system\ZMVTV.exe.bat MPVHTWE.exe File created C:\windows\XEZW.exe.bat YTWGG.exe File created C:\windows\BBAXGJ.exe VGPESU.exe File created C:\windows\system\FAEMUHZ.exe MHXBDGJ.exe File opened for modification C:\windows\system\HOCO.exe QGA.exe File opened for modification C:\windows\SKBKAOH.exe CUA.exe File created C:\windows\KCN.exe.bat SJDTYYJ.exe File created C:\windows\system\YAOA.exe.bat HSAV.exe File created C:\windows\system\RXFP.exe.bat NHYH.exe File created C:\windows\system\UFIDA.exe.bat QXCVOSU.exe File created C:\windows\system\LPZ.exe.bat EAOV.exe File created C:\windows\system\XJAODW.exe ZYXYUQB.exe File created C:\windows\system\CNHD.exe.bat GFNVP.exe File created C:\windows\ZYXYUQB.exe RLLRKKF.exe File opened for modification C:\windows\ZYXYUQB.exe RLLRKKF.exe File opened for modification C:\windows\system\LKTPC.exe BMNVV.exe File created C:\windows\YTYMODI.exe QGM.exe File created C:\windows\system\RPVGS.exe QMRCNP.exe File created C:\windows\system\LKTPC.exe BMNVV.exe File opened for modification C:\windows\system\CYC.exe JXN.exe File created C:\windows\system\SZK.exe FOC.exe File created C:\windows\PKYQKI.exe NUS.exe File opened for modification C:\windows\system\GNME.exe FSIIOQ.exe File opened for modification C:\windows\FOC.exe MLYZXH.exe File created C:\windows\system\UFIDA.exe QXCVOSU.exe File opened for modification C:\windows\system\OOOZZA.exe SOEOVWM.exe File created C:\windows\PUXS.exe.bat AROGBQ.exe File created C:\windows\HPB.exe.bat PUXS.exe File opened for modification C:\windows\TRJF.exe UDSWCE.exe File created C:\windows\RPAWJN.exe.bat NMPJ.exe File created C:\windows\system\PKDDM.exe DUXDAOR.exe File opened for modification C:\windows\ICJLD.exe CCB.exe File created C:\windows\system\NUS.exe.bat SJC.exe File opened for modification C:\windows\JFTCA.exe ZHGIK.exe File opened for modification C:\windows\YFXKH.exe XCT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 4420 3788 WerFault.exe 80 4788 2088 WerFault.exe 85 1232 5096 WerFault.exe 91 2592 4676 WerFault.exe 96 2860 3724 WerFault.exe 103 1396 2620 WerFault.exe 108 4992 2168 WerFault.exe 115 212 1680 WerFault.exe 120 884 2940 WerFault.exe 125 1488 1928 WerFault.exe 131 1640 2540 WerFault.exe 136 3108 1284 WerFault.exe 141 5004 2260 WerFault.exe 146 4756 404 WerFault.exe 153 2524 1220 WerFault.exe 158 3576 1748 WerFault.exe 163 884 2104 WerFault.exe 168 3624 1236 WerFault.exe 173 4004 372 WerFault.exe 178 2292 2496 WerFault.exe 183 5088 3208 WerFault.exe 188 540 1952 WerFault.exe 193 4000 4188 WerFault.exe 198 1728 3180 WerFault.exe 203 4116 4556 WerFault.exe 208 2356 3424 WerFault.exe 213 1888 2392 WerFault.exe 218 4908 1512 WerFault.exe 223 4540 1840 WerFault.exe 228 2252 864 WerFault.exe 232 2484 644 WerFault.exe 238 1464 4280 WerFault.exe 243 4032 932 WerFault.exe 248 2968 2104 WerFault.exe 253 4412 4524 WerFault.exe 258 3380 2356 WerFault.exe 263 4484 1888 WerFault.exe 268 4560 4508 WerFault.exe 274 4376 4336 WerFault.exe 279 456 1144 WerFault.exe 285 4296 3956 WerFault.exe 290 4248 8 WerFault.exe 295 4988 3808 WerFault.exe 300 4524 3724 WerFault.exe 305 3380 1652 WerFault.exe 310 2536 1388 WerFault.exe 315 2576 4404 WerFault.exe 320 4040 2532 WerFault.exe 325 4176 4540 WerFault.exe 330 3632 4872 WerFault.exe 335 2540 3100 WerFault.exe 340 1592 1960 WerFault.exe 345 3172 4820 WerFault.exe 350 3384 2680 WerFault.exe 355 2168 2444 WerFault.exe 360 2576 1468 WerFault.exe 365 1744 4404 WerFault.exe 370 4368 3728 WerFault.exe 375 1236 4328 WerFault.exe 380 2408 3368 WerFault.exe 385 4756 4248 WerFault.exe 390 1172 4916 WerFault.exe 395 208 1952 WerFault.exe 400 2804 3524 WerFault.exe 405 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3788 163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea_NeikiAnalytics.exe 3788 163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea_NeikiAnalytics.exe 2088 AJNAFZ.exe 2088 AJNAFZ.exe 5096 VWS.exe 5096 VWS.exe 4676 CZXN.exe 4676 CZXN.exe 3724 RFVKPF.exe 3724 RFVKPF.exe 2620 BVIEW.exe 2620 BVIEW.exe 2168 UYMAKDU.exe 2168 UYMAKDU.exe 1680 SJPQKR.exe 1680 SJPQKR.exe 2940 EBSISZG.exe 2940 EBSISZG.exe 1928 QRYQF.exe 1928 QRYQF.exe 2540 YXDX.exe 2540 YXDX.exe 1284 HFFCTN.exe 1284 HFFCTN.exe 2260 WAWH.exe 2260 WAWH.exe 404 SGJKPF.exe 404 SGJKPF.exe 1220 YBU.exe 1220 YBU.exe 1748 AROGBQ.exe 1748 AROGBQ.exe 2104 PUXS.exe 2104 PUXS.exe 1236 HPB.exe 1236 HPB.exe 372 ZXDB.exe 372 ZXDB.exe 2496 BKUCW.exe 2496 BKUCW.exe 3208 YLEF.exe 3208 YLEF.exe 1952 CTLNMG.exe 1952 CTLNMG.exe 4188 BMNVV.exe 4188 BMNVV.exe 3180 LKTPC.exe 3180 LKTPC.exe 4556 FXYYNUL.exe 4556 FXYYNUL.exe 3424 NCKFXT.exe 3424 NCKFXT.exe 2392 RSRN.exe 2392 RSRN.exe 1512 QDU.exe 1512 QDU.exe 1840 ULIDW.exe 1840 ULIDW.exe 864 AHAEBM.exe 864 AHAEBM.exe 644 JUKW.exe 644 JUKW.exe 4280 NXIRRCT.exe 4280 NXIRRCT.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3788 163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea_NeikiAnalytics.exe 3788 163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea_NeikiAnalytics.exe 2088 AJNAFZ.exe 2088 AJNAFZ.exe 5096 VWS.exe 5096 VWS.exe 4676 CZXN.exe 4676 CZXN.exe 3724 RFVKPF.exe 3724 RFVKPF.exe 2620 BVIEW.exe 2620 BVIEW.exe 2168 UYMAKDU.exe 2168 UYMAKDU.exe 1680 SJPQKR.exe 1680 SJPQKR.exe 2940 EBSISZG.exe 2940 EBSISZG.exe 1928 QRYQF.exe 1928 QRYQF.exe 2540 YXDX.exe 2540 YXDX.exe 1284 HFFCTN.exe 1284 HFFCTN.exe 2260 WAWH.exe 2260 WAWH.exe 404 SGJKPF.exe 404 SGJKPF.exe 1220 YBU.exe 1220 YBU.exe 1748 AROGBQ.exe 1748 AROGBQ.exe 2104 PUXS.exe 2104 PUXS.exe 1236 HPB.exe 1236 HPB.exe 372 ZXDB.exe 372 ZXDB.exe 2496 BKUCW.exe 2496 BKUCW.exe 3208 YLEF.exe 3208 YLEF.exe 1952 CTLNMG.exe 1952 CTLNMG.exe 4188 BMNVV.exe 4188 BMNVV.exe 3180 LKTPC.exe 3180 LKTPC.exe 4556 FXYYNUL.exe 4556 FXYYNUL.exe 3424 NCKFXT.exe 3424 NCKFXT.exe 2392 RSRN.exe 2392 RSRN.exe 1512 QDU.exe 1512 QDU.exe 1840 ULIDW.exe 1840 ULIDW.exe 864 AHAEBM.exe 864 AHAEBM.exe 644 JUKW.exe 644 JUKW.exe 4280 NXIRRCT.exe 4280 NXIRRCT.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3788 wrote to memory of 4800 3788 163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea_NeikiAnalytics.exe 81 PID 3788 wrote to memory of 4800 3788 163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea_NeikiAnalytics.exe 81 PID 3788 wrote to memory of 4800 3788 163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea_NeikiAnalytics.exe 81 PID 4800 wrote to memory of 2088 4800 cmd.exe 85 PID 4800 wrote to memory of 2088 4800 cmd.exe 85 PID 4800 wrote to memory of 2088 4800 cmd.exe 85 PID 2088 wrote to memory of 3952 2088 AJNAFZ.exe 87 PID 2088 wrote to memory of 3952 2088 AJNAFZ.exe 87 PID 2088 wrote to memory of 3952 2088 AJNAFZ.exe 87 PID 3952 wrote to memory of 5096 3952 cmd.exe 91 PID 3952 wrote to memory of 5096 3952 cmd.exe 91 PID 3952 wrote to memory of 5096 3952 cmd.exe 91 PID 5096 wrote to memory of 2232 5096 VWS.exe 92 PID 5096 wrote to memory of 2232 5096 VWS.exe 92 PID 5096 wrote to memory of 2232 5096 VWS.exe 92 PID 2232 wrote to memory of 4676 2232 cmd.exe 96 PID 2232 wrote to memory of 4676 2232 cmd.exe 96 PID 2232 wrote to memory of 4676 2232 cmd.exe 96 PID 4676 wrote to memory of 1836 4676 CZXN.exe 99 PID 4676 wrote to memory of 1836 4676 CZXN.exe 99 PID 4676 wrote to memory of 1836 4676 CZXN.exe 99 PID 1836 wrote to memory of 3724 1836 cmd.exe 103 PID 1836 wrote to memory of 3724 1836 cmd.exe 103 PID 1836 wrote to memory of 3724 1836 cmd.exe 103 PID 3724 wrote to memory of 436 3724 RFVKPF.exe 104 PID 3724 wrote to memory of 436 3724 RFVKPF.exe 104 PID 3724 wrote to memory of 436 3724 RFVKPF.exe 104 PID 436 wrote to memory of 2620 436 cmd.exe 108 PID 436 wrote to memory of 2620 436 cmd.exe 108 PID 436 wrote to memory of 2620 436 cmd.exe 108 PID 2620 wrote to memory of 2292 2620 BVIEW.exe 111 PID 2620 wrote to memory of 2292 2620 BVIEW.exe 111 PID 2620 wrote to memory of 2292 2620 BVIEW.exe 111 PID 2292 wrote to memory of 2168 2292 cmd.exe 115 PID 2292 wrote to memory of 2168 2292 cmd.exe 115 PID 2292 wrote to memory of 2168 2292 cmd.exe 115 PID 2168 wrote to memory of 1272 2168 UYMAKDU.exe 116 PID 2168 wrote to memory of 1272 2168 UYMAKDU.exe 116 PID 2168 wrote to memory of 1272 2168 UYMAKDU.exe 116 PID 1272 wrote to memory of 1680 1272 cmd.exe 120 PID 1272 wrote to memory of 1680 1272 cmd.exe 120 PID 1272 wrote to memory of 1680 1272 cmd.exe 120 PID 1680 wrote to memory of 4052 1680 SJPQKR.exe 121 PID 1680 wrote to memory of 4052 1680 SJPQKR.exe 121 PID 1680 wrote to memory of 4052 1680 SJPQKR.exe 121 PID 4052 wrote to memory of 2940 4052 cmd.exe 125 PID 4052 wrote to memory of 2940 4052 cmd.exe 125 PID 4052 wrote to memory of 2940 4052 cmd.exe 125 PID 2940 wrote to memory of 1524 2940 EBSISZG.exe 126 PID 2940 wrote to memory of 1524 2940 EBSISZG.exe 126 PID 2940 wrote to memory of 1524 2940 EBSISZG.exe 126 PID 1524 wrote to memory of 1928 1524 cmd.exe 131 PID 1524 wrote to memory of 1928 1524 cmd.exe 131 PID 1524 wrote to memory of 1928 1524 cmd.exe 131 PID 1928 wrote to memory of 3700 1928 QRYQF.exe 132 PID 1928 wrote to memory of 3700 1928 QRYQF.exe 132 PID 1928 wrote to memory of 3700 1928 QRYQF.exe 132 PID 3700 wrote to memory of 2540 3700 cmd.exe 136 PID 3700 wrote to memory of 2540 3700 cmd.exe 136 PID 3700 wrote to memory of 2540 3700 cmd.exe 136 PID 2540 wrote to memory of 1656 2540 YXDX.exe 137 PID 2540 wrote to memory of 1656 2540 YXDX.exe 137 PID 2540 wrote to memory of 1656 2540 YXDX.exe 137 PID 1656 wrote to memory of 1284 1656 cmd.exe 141
Processes
-
C:\Users\Admin\AppData\Local\Temp\163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\163efdf04e0a8cdb8993116f150bdcdd5762934d7437d759189ea1329fb7c9ea_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AJNAFZ.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\windows\system\AJNAFZ.exeC:\windows\system\AJNAFZ.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VWS.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\windows\SysWOW64\VWS.exeC:\windows\system32\VWS.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CZXN.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\windows\SysWOW64\CZXN.exeC:\windows\system32\CZXN.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RFVKPF.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\windows\RFVKPF.exeC:\windows\RFVKPF.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BVIEW.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\windows\SysWOW64\BVIEW.exeC:\windows\system32\BVIEW.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UYMAKDU.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\windows\SysWOW64\UYMAKDU.exeC:\windows\system32\UYMAKDU.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SJPQKR.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\windows\system\SJPQKR.exeC:\windows\system\SJPQKR.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\EBSISZG.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\windows\SysWOW64\EBSISZG.exeC:\windows\system32\EBSISZG.exe17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QRYQF.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\windows\QRYQF.exeC:\windows\QRYQF.exe19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YXDX.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\windows\system\YXDX.exeC:\windows\system\YXDX.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HFFCTN.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\windows\SysWOW64\HFFCTN.exeC:\windows\system32\HFFCTN.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WAWH.exe.bat" "24⤵PID:2348
-
C:\windows\WAWH.exeC:\windows\WAWH.exe25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SGJKPF.exe.bat" "26⤵PID:2880
-
C:\windows\system\SGJKPF.exeC:\windows\system\SGJKPF.exe27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YBU.exe.bat" "28⤵PID:4392
-
C:\windows\SysWOW64\YBU.exeC:\windows\system32\YBU.exe29⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AROGBQ.exe.bat" "30⤵PID:3964
-
C:\windows\AROGBQ.exeC:\windows\AROGBQ.exe31⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PUXS.exe.bat" "32⤵PID:1468
-
C:\windows\PUXS.exeC:\windows\PUXS.exe33⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HPB.exe.bat" "34⤵PID:4712
-
C:\windows\HPB.exeC:\windows\HPB.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZXDB.exe.bat" "36⤵PID:4872
-
C:\windows\system\ZXDB.exeC:\windows\system\ZXDB.exe37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BKUCW.exe.bat" "38⤵PID:1640
-
C:\windows\BKUCW.exeC:\windows\BKUCW.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YLEF.exe.bat" "40⤵PID:4488
-
C:\windows\SysWOW64\YLEF.exeC:\windows\system32\YLEF.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CTLNMG.exe.bat" "42⤵PID:5004
-
C:\windows\SysWOW64\CTLNMG.exeC:\windows\system32\CTLNMG.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BMNVV.exe.bat" "44⤵PID:2468
-
C:\windows\SysWOW64\BMNVV.exeC:\windows\system32\BMNVV.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LKTPC.exe.bat" "46⤵PID:1564
-
C:\windows\system\LKTPC.exeC:\windows\system\LKTPC.exe47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FXYYNUL.exe.bat" "48⤵PID:220
-
C:\windows\system\FXYYNUL.exeC:\windows\system\FXYYNUL.exe49⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NCKFXT.exe.bat" "50⤵PID:2440
-
C:\windows\SysWOW64\NCKFXT.exeC:\windows\system32\NCKFXT.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RSRN.exe.bat" "52⤵PID:3700
-
C:\windows\SysWOW64\RSRN.exeC:\windows\system32\RSRN.exe53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QDU.exe.bat" "54⤵PID:2680
-
C:\windows\SysWOW64\QDU.exeC:\windows\system32\QDU.exe55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ULIDW.exe.bat" "56⤵PID:3252
-
C:\windows\ULIDW.exeC:\windows\ULIDW.exe57⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AHAEBM.exe.bat" "58⤵PID:4424
-
C:\windows\AHAEBM.exeC:\windows\AHAEBM.exe59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JUKW.exe.bat" "60⤵PID:2900
-
C:\windows\system\JUKW.exeC:\windows\system\JUKW.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NXIRRCT.exe.bat" "62⤵PID:380
-
C:\windows\SysWOW64\NXIRRCT.exeC:\windows\system32\NXIRRCT.exe63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XVWL.exe.bat" "64⤵PID:4040
-
C:\windows\system\XVWL.exeC:\windows\system\XVWL.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZSCG.exe.bat" "66⤵PID:4296
-
C:\windows\SysWOW64\ZSCG.exeC:\windows\system32\ZSCG.exe67⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UDSWCE.exe.bat" "68⤵PID:2408
-
C:\windows\UDSWCE.exeC:\windows\UDSWCE.exe69⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TRJF.exe.bat" "70⤵PID:4532
-
C:\windows\TRJF.exeC:\windows\TRJF.exe71⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OBAWNJQ.exe.bat" "72⤵PID:3188
-
C:\windows\SysWOW64\OBAWNJQ.exeC:\windows\system32\OBAWNJQ.exe73⤵
- Checks computer location settings
- Executes dropped EXE
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SRGEZ.exe.bat" "74⤵PID:3524
-
C:\windows\SRGEZ.exeC:\windows\SRGEZ.exe75⤵
- Executes dropped EXE
PID:4508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FPGPB.exe.bat" "76⤵PID:760
-
C:\windows\FPGPB.exeC:\windows\FPGPB.exe77⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JXN.exe.bat" "78⤵PID:864
-
C:\windows\system\JXN.exeC:\windows\system\JXN.exe79⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CYC.exe.bat" "80⤵PID:540
-
C:\windows\system\CYC.exeC:\windows\system\CYC.exe81⤵
- Executes dropped EXE
PID:3956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ILB.exe.bat" "82⤵PID:4860
-
C:\windows\system\ILB.exeC:\windows\system\ILB.exe83⤵
- Executes dropped EXE
PID:8 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YOLOUO.exe.bat" "84⤵PID:1892
-
C:\windows\system\YOLOUO.exeC:\windows\system\YOLOUO.exe85⤵
- Executes dropped EXE
PID:3808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LMLZW.exe.bat" "86⤵PID:624
-
C:\windows\LMLZW.exeC:\windows\LMLZW.exe87⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KKE.exe.bat" "88⤵PID:3224
-
C:\windows\SysWOW64\KKE.exeC:\windows\system32\KKE.exe89⤵
- Checks computer location settings
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ONCPRY.exe.bat" "90⤵PID:1556
-
C:\windows\system\ONCPRY.exeC:\windows\system\ONCPRY.exe91⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BPLO.exe.bat" "92⤵PID:3996
-
C:\windows\SysWOW64\BPLO.exeC:\windows\system32\BPLO.exe93⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QGM.exe.bat" "94⤵PID:3112
-
C:\windows\SysWOW64\QGM.exeC:\windows\system32\QGM.exe95⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2532 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YTYMODI.exe.bat" "96⤵PID:2692
-
C:\windows\YTYMODI.exeC:\windows\YTYMODI.exe97⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\IREGELR.exe.bat" "98⤵PID:3464
-
C:\windows\system\IREGELR.exeC:\windows\system\IREGELR.exe99⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KPSB.exe.bat" "100⤵PID:4420
-
C:\windows\SysWOW64\KPSB.exeC:\windows\system32\KPSB.exe101⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YKVURI.exe.bat" "102⤵PID:1108
-
C:\windows\SysWOW64\YKVURI.exeC:\windows\system32\YKVURI.exe103⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NHBRGS.exe.bat" "104⤵PID:1912
-
C:\windows\SysWOW64\NHBRGS.exeC:\windows\system32\NHBRGS.exe105⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GIQCQT.exe.bat" "106⤵PID:3448
-
C:\windows\SysWOW64\GIQCQT.exeC:\windows\system32\GIQCQT.exe107⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BVVLATG.exe.bat" "108⤵PID:4276
-
C:\windows\BVVLATG.exeC:\windows\BVVLATG.exe109⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FDCTE.exe.bat" "110⤵PID:628
-
C:\windows\FDCTE.exeC:\windows\FDCTE.exe111⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SJC.exe.bat" "112⤵PID:3912
-
C:\windows\SysWOW64\SJC.exeC:\windows\system32\SJC.exe113⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NUS.exe.bat" "114⤵PID:4336
-
C:\windows\system\NUS.exeC:\windows\system\NUS.exe115⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PKYQKI.exe.bat" "116⤵PID:1656
-
C:\windows\PKYQKI.exeC:\windows\PKYQKI.exe117⤵
- Checks computer location settings
- Executes dropped EXE
PID:4328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HSAV.exe.bat" "118⤵PID:4020
-
C:\windows\system\HSAV.exeC:\windows\system\HSAV.exe119⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YAOA.exe.bat" "120⤵PID:4608
-
C:\windows\system\YAOA.exeC:\windows\system\YAOA.exe121⤵
- Executes dropped EXE
PID:4248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YGHPB.exe.bat" "122⤵PID:5096
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-