Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 22:59
Behavioral task
behavioral1
Sample
1efab577c7ea5ea5defb29cbe6dc65af5640cf44b3a0576afa5e026f00a0d473_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1efab577c7ea5ea5defb29cbe6dc65af5640cf44b3a0576afa5e026f00a0d473_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
1efab577c7ea5ea5defb29cbe6dc65af5640cf44b3a0576afa5e026f00a0d473_NeikiAnalytics.exe
-
Size
435KB
-
MD5
3302c70a09862ad878eacf0f2cd74960
-
SHA1
373124cf28ad62bbc43169dd6fe2ae831204f7ce
-
SHA256
1efab577c7ea5ea5defb29cbe6dc65af5640cf44b3a0576afa5e026f00a0d473
-
SHA512
ae7e80885d1427b3aa5ca669f9aefac3a5cf4f55b8b45639d1b6baa10b3ce4ac94f6bc4eee8f640a161f98fda0d717077531c65dc670b38b477a29a746ca1a06
-
SSDEEP
12288:As3xSP86lNxuHwJhfLsLx69sarBP1pl5faA:AshSPwHwPExobD5fr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation F9A0M.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation F9220.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 6PU12.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 91A9B.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 8C729.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 5MKW4.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 34967.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 13IKF.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation YG23I.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation I086Q.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation DCSGB.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 5J8JJ.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 0H567.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 66H57.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation PXQ3Z.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation Y5M51.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 46273.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation MD9L3.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 86194.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 67N4H.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 4987G.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 68IH3.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation PQ5EF.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation V834D.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation CP487.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 8U1JJ.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation G311O.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 36O1D.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation D7V5F.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 100D4.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 2IV08.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 2EMLH.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 8DPDR.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 6X0B7.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation TUP51.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 89C44.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 1XFE7.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 90QG2.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 8INRV.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 6IVX6.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 6X761.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation AEXD2.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 30H5X.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation Q888K.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation ZIK65.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation E4511.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 6RDZZ.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 4YCD1.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation JM9DQ.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation ZFV9I.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 3X42V.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation AADPN.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 038MX.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation Y814Q.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation WTLT6.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation HD474.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 76224.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 306Z5.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 870S6.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation W92Q6.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation AJNKS.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation V6II8.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation KN5V4.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 2NJRA.exe -
Executes dropped EXE 64 IoCs
pid Process 5040 97197.exe 4780 V4716.exe 1700 306Z5.exe 4992 QK8YP.exe 1324 2TNW4.exe 4908 870S6.exe 3792 PXQ3Z.exe 4768 Y5M51.exe 1320 E996W.exe 452 KUO0V.exe 5016 HF7DR.exe 4964 0L22P.exe 2252 2VPNL.exe 1140 6PV9Y.exe 2712 QLC7F.exe 3864 0HTTV.exe 852 11KEL.exe 2752 341C4.exe 4992 5QOZ5.exe 2348 90QG2.exe 2944 7Y9X2.exe 3008 DY45X.exe 4976 EG829.exe 5108 6B800.exe 1400 4Y8LY.exe 916 N266R.exe 5076 SGT9Q.exe 3472 JX17T.exe 2332 F9A0M.exe 1984 7BFWG.exe 3484 B2V46.exe 2468 8INRV.exe 2068 8F9DI.exe 2112 1XAZ6.exe 2588 75511.exe 5028 503R9.exe 2316 L1R90.exe 4256 46273.exe 2620 S36BV.exe 1972 7I6V4.exe 436 RPLCJ.exe 2476 66H57.exe 4684 DQSMN.exe 1796 Q888K.exe 2188 O9S2U.exe 1216 NE442.exe 1332 V6II8.exe 2068 AV2AD.exe 712 55D09.exe 860 8U1JJ.exe 4432 384BX.exe 3468 6EC8J.exe 2464 FI1CA.exe 2412 84REM.exe 244 1IE1G.exe 3228 F6P66.exe 2780 36O1D.exe 2192 W1Y49.exe 852 7558L.exe 1768 EH6BJ.exe 3696 YG0RI.exe 1584 F9220.exe 1016 5KT3S.exe 4284 XSBE7.exe -
resource yara_rule behavioral2/memory/2228-0-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000a000000023401-5.dat upx behavioral2/memory/2228-10-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/5040-9-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023419-18.dat upx behavioral2/memory/4780-21-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/5040-20-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000700000002341a-28.dat upx behavioral2/memory/4780-31-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0008000000023416-38.dat upx behavioral2/memory/4992-40-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/1700-42-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000700000002341c-49.dat upx behavioral2/memory/4992-52-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/1324-53-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000700000002341d-61.dat upx behavioral2/memory/1324-63-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/4908-64-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000700000002341e-72.dat upx behavioral2/memory/4908-74-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000700000002341f-82.dat upx behavioral2/memory/3792-84-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/4768-85-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023420-92.dat upx behavioral2/memory/4768-94-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000a000000023373-102.dat upx behavioral2/memory/1320-104-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000a000000023375-112.dat upx behavioral2/memory/452-113-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0008000000023423-120.dat upx behavioral2/memory/5016-123-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/2252-132-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0008000000023425-131.dat upx behavioral2/memory/4964-133-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023426-141.dat upx behavioral2/memory/2252-144-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/1140-143-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023428-151.dat upx behavioral2/memory/1140-153-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0002000000022f1f-162.dat upx behavioral2/memory/3864-163-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/2712-165-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0008000000023429-172.dat upx behavioral2/memory/3864-174-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000800000002342b-182.dat upx behavioral2/memory/2752-185-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/852-184-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000700000002342c-193.dat upx behavioral2/memory/2752-195-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000b00000002336d-203.dat upx behavioral2/memory/2348-206-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/4992-205-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0009000000023372-213.dat upx behavioral2/memory/2348-216-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000700000002342d-223.dat upx behavioral2/memory/2944-226-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/3008-227-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x000700000002342f-235.dat upx behavioral2/memory/3008-237-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/memory/4976-238-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023430-246.dat upx behavioral2/memory/4976-247-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral2/files/0x0007000000023431-254.dat upx behavioral2/memory/5108-257-0x0000000000400000-0x000000000053B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2228 1efab577c7ea5ea5defb29cbe6dc65af5640cf44b3a0576afa5e026f00a0d473_NeikiAnalytics.exe 2228 1efab577c7ea5ea5defb29cbe6dc65af5640cf44b3a0576afa5e026f00a0d473_NeikiAnalytics.exe 5040 97197.exe 5040 97197.exe 4780 V4716.exe 4780 V4716.exe 1700 306Z5.exe 1700 306Z5.exe 4992 QK8YP.exe 4992 QK8YP.exe 1324 2TNW4.exe 1324 2TNW4.exe 4908 870S6.exe 4908 870S6.exe 3792 PXQ3Z.exe 3792 PXQ3Z.exe 4768 Y5M51.exe 4768 Y5M51.exe 1320 E996W.exe 1320 E996W.exe 452 KUO0V.exe 452 KUO0V.exe 5016 HF7DR.exe 5016 HF7DR.exe 4964 0L22P.exe 4964 0L22P.exe 2252 2VPNL.exe 2252 2VPNL.exe 1140 6PV9Y.exe 1140 6PV9Y.exe 2712 QLC7F.exe 2712 QLC7F.exe 3864 0HTTV.exe 3864 0HTTV.exe 852 11KEL.exe 852 11KEL.exe 2752 341C4.exe 2752 341C4.exe 4992 5QOZ5.exe 4992 5QOZ5.exe 2348 90QG2.exe 2348 90QG2.exe 2944 7Y9X2.exe 2944 7Y9X2.exe 3008 DY45X.exe 3008 DY45X.exe 4976 EG829.exe 4976 EG829.exe 5108 6B800.exe 5108 6B800.exe 1400 4Y8LY.exe 1400 4Y8LY.exe 916 N266R.exe 916 N266R.exe 5076 SGT9Q.exe 5076 SGT9Q.exe 3472 JX17T.exe 3472 JX17T.exe 2332 F9A0M.exe 2332 F9A0M.exe 1984 7BFWG.exe 1984 7BFWG.exe 3484 B2V46.exe 3484 B2V46.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 5040 2228 1efab577c7ea5ea5defb29cbe6dc65af5640cf44b3a0576afa5e026f00a0d473_NeikiAnalytics.exe 83 PID 2228 wrote to memory of 5040 2228 1efab577c7ea5ea5defb29cbe6dc65af5640cf44b3a0576afa5e026f00a0d473_NeikiAnalytics.exe 83 PID 2228 wrote to memory of 5040 2228 1efab577c7ea5ea5defb29cbe6dc65af5640cf44b3a0576afa5e026f00a0d473_NeikiAnalytics.exe 83 PID 5040 wrote to memory of 4780 5040 97197.exe 84 PID 5040 wrote to memory of 4780 5040 97197.exe 84 PID 5040 wrote to memory of 4780 5040 97197.exe 84 PID 4780 wrote to memory of 1700 4780 V4716.exe 86 PID 4780 wrote to memory of 1700 4780 V4716.exe 86 PID 4780 wrote to memory of 1700 4780 V4716.exe 86 PID 1700 wrote to memory of 4992 1700 306Z5.exe 88 PID 1700 wrote to memory of 4992 1700 306Z5.exe 88 PID 1700 wrote to memory of 4992 1700 306Z5.exe 88 PID 4992 wrote to memory of 1324 4992 QK8YP.exe 89 PID 4992 wrote to memory of 1324 4992 QK8YP.exe 89 PID 4992 wrote to memory of 1324 4992 QK8YP.exe 89 PID 1324 wrote to memory of 4908 1324 2TNW4.exe 91 PID 1324 wrote to memory of 4908 1324 2TNW4.exe 91 PID 1324 wrote to memory of 4908 1324 2TNW4.exe 91 PID 4908 wrote to memory of 3792 4908 870S6.exe 92 PID 4908 wrote to memory of 3792 4908 870S6.exe 92 PID 4908 wrote to memory of 3792 4908 870S6.exe 92 PID 3792 wrote to memory of 4768 3792 PXQ3Z.exe 93 PID 3792 wrote to memory of 4768 3792 PXQ3Z.exe 93 PID 3792 wrote to memory of 4768 3792 PXQ3Z.exe 93 PID 4768 wrote to memory of 1320 4768 Y5M51.exe 94 PID 4768 wrote to memory of 1320 4768 Y5M51.exe 94 PID 4768 wrote to memory of 1320 4768 Y5M51.exe 94 PID 1320 wrote to memory of 452 1320 E996W.exe 95 PID 1320 wrote to memory of 452 1320 E996W.exe 95 PID 1320 wrote to memory of 452 1320 E996W.exe 95 PID 452 wrote to memory of 5016 452 KUO0V.exe 98 PID 452 wrote to memory of 5016 452 KUO0V.exe 98 PID 452 wrote to memory of 5016 452 KUO0V.exe 98 PID 5016 wrote to memory of 4964 5016 HF7DR.exe 99 PID 5016 wrote to memory of 4964 5016 HF7DR.exe 99 PID 5016 wrote to memory of 4964 5016 HF7DR.exe 99 PID 4964 wrote to memory of 2252 4964 0L22P.exe 100 PID 4964 wrote to memory of 2252 4964 0L22P.exe 100 PID 4964 wrote to memory of 2252 4964 0L22P.exe 100 PID 2252 wrote to memory of 1140 2252 2VPNL.exe 102 PID 2252 wrote to memory of 1140 2252 2VPNL.exe 102 PID 2252 wrote to memory of 1140 2252 2VPNL.exe 102 PID 1140 wrote to memory of 2712 1140 6PV9Y.exe 104 PID 1140 wrote to memory of 2712 1140 6PV9Y.exe 104 PID 1140 wrote to memory of 2712 1140 6PV9Y.exe 104 PID 2712 wrote to memory of 3864 2712 QLC7F.exe 105 PID 2712 wrote to memory of 3864 2712 QLC7F.exe 105 PID 2712 wrote to memory of 3864 2712 QLC7F.exe 105 PID 3864 wrote to memory of 852 3864 0HTTV.exe 106 PID 3864 wrote to memory of 852 3864 0HTTV.exe 106 PID 3864 wrote to memory of 852 3864 0HTTV.exe 106 PID 852 wrote to memory of 2752 852 11KEL.exe 107 PID 852 wrote to memory of 2752 852 11KEL.exe 107 PID 852 wrote to memory of 2752 852 11KEL.exe 107 PID 2752 wrote to memory of 4992 2752 341C4.exe 108 PID 2752 wrote to memory of 4992 2752 341C4.exe 108 PID 2752 wrote to memory of 4992 2752 341C4.exe 108 PID 4992 wrote to memory of 2348 4992 5QOZ5.exe 109 PID 4992 wrote to memory of 2348 4992 5QOZ5.exe 109 PID 4992 wrote to memory of 2348 4992 5QOZ5.exe 109 PID 2348 wrote to memory of 2944 2348 90QG2.exe 110 PID 2348 wrote to memory of 2944 2348 90QG2.exe 110 PID 2348 wrote to memory of 2944 2348 90QG2.exe 110 PID 2944 wrote to memory of 3008 2944 7Y9X2.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\1efab577c7ea5ea5defb29cbe6dc65af5640cf44b3a0576afa5e026f00a0d473_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1efab577c7ea5ea5defb29cbe6dc65af5640cf44b3a0576afa5e026f00a0d473_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\97197.exe"C:\Users\Admin\AppData\Local\Temp\97197.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\V4716.exe"C:\Users\Admin\AppData\Local\Temp\V4716.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\306Z5.exe"C:\Users\Admin\AppData\Local\Temp\306Z5.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\QK8YP.exe"C:\Users\Admin\AppData\Local\Temp\QK8YP.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\2TNW4.exe"C:\Users\Admin\AppData\Local\Temp\2TNW4.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\870S6.exe"C:\Users\Admin\AppData\Local\Temp\870S6.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\PXQ3Z.exe"C:\Users\Admin\AppData\Local\Temp\PXQ3Z.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\Y5M51.exe"C:\Users\Admin\AppData\Local\Temp\Y5M51.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\E996W.exe"C:\Users\Admin\AppData\Local\Temp\E996W.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\KUO0V.exe"C:\Users\Admin\AppData\Local\Temp\KUO0V.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\HF7DR.exe"C:\Users\Admin\AppData\Local\Temp\HF7DR.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\0L22P.exe"C:\Users\Admin\AppData\Local\Temp\0L22P.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\2VPNL.exe"C:\Users\Admin\AppData\Local\Temp\2VPNL.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\6PV9Y.exe"C:\Users\Admin\AppData\Local\Temp\6PV9Y.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\QLC7F.exe"C:\Users\Admin\AppData\Local\Temp\QLC7F.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\0HTTV.exe"C:\Users\Admin\AppData\Local\Temp\0HTTV.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\11KEL.exe"C:\Users\Admin\AppData\Local\Temp\11KEL.exe"18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\341C4.exe"C:\Users\Admin\AppData\Local\Temp\341C4.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\5QOZ5.exe"C:\Users\Admin\AppData\Local\Temp\5QOZ5.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\90QG2.exe"C:\Users\Admin\AppData\Local\Temp\90QG2.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\7Y9X2.exe"C:\Users\Admin\AppData\Local\Temp\7Y9X2.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\DY45X.exe"C:\Users\Admin\AppData\Local\Temp\DY45X.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\EG829.exe"C:\Users\Admin\AppData\Local\Temp\EG829.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\6B800.exe"C:\Users\Admin\AppData\Local\Temp\6B800.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\4Y8LY.exe"C:\Users\Admin\AppData\Local\Temp\4Y8LY.exe"26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\N266R.exe"C:\Users\Admin\AppData\Local\Temp\N266R.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:916 -
C:\Users\Admin\AppData\Local\Temp\SGT9Q.exe"C:\Users\Admin\AppData\Local\Temp\SGT9Q.exe"28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\JX17T.exe"C:\Users\Admin\AppData\Local\Temp\JX17T.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\F9A0M.exe"C:\Users\Admin\AppData\Local\Temp\F9A0M.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\7BFWG.exe"C:\Users\Admin\AppData\Local\Temp\7BFWG.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\B2V46.exe"C:\Users\Admin\AppData\Local\Temp\B2V46.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\8INRV.exe"C:\Users\Admin\AppData\Local\Temp\8INRV.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\8F9DI.exe"C:\Users\Admin\AppData\Local\Temp\8F9DI.exe"34⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\1XAZ6.exe"C:\Users\Admin\AppData\Local\Temp\1XAZ6.exe"35⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\75511.exe"C:\Users\Admin\AppData\Local\Temp\75511.exe"36⤵
- Executes dropped EXE
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\503R9.exe"C:\Users\Admin\AppData\Local\Temp\503R9.exe"37⤵
- Executes dropped EXE
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\L1R90.exe"C:\Users\Admin\AppData\Local\Temp\L1R90.exe"38⤵
- Executes dropped EXE
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\46273.exe"C:\Users\Admin\AppData\Local\Temp\46273.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\S36BV.exe"C:\Users\Admin\AppData\Local\Temp\S36BV.exe"40⤵
- Executes dropped EXE
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\7I6V4.exe"C:\Users\Admin\AppData\Local\Temp\7I6V4.exe"41⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\RPLCJ.exe"C:\Users\Admin\AppData\Local\Temp\RPLCJ.exe"42⤵
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\66H57.exe"C:\Users\Admin\AppData\Local\Temp\66H57.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\DQSMN.exe"C:\Users\Admin\AppData\Local\Temp\DQSMN.exe"44⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\Q888K.exe"C:\Users\Admin\AppData\Local\Temp\Q888K.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\O9S2U.exe"C:\Users\Admin\AppData\Local\Temp\O9S2U.exe"46⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\NE442.exe"C:\Users\Admin\AppData\Local\Temp\NE442.exe"47⤵
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\V6II8.exe"C:\Users\Admin\AppData\Local\Temp\V6II8.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\AV2AD.exe"C:\Users\Admin\AppData\Local\Temp\AV2AD.exe"49⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\55D09.exe"C:\Users\Admin\AppData\Local\Temp\55D09.exe"50⤵
- Executes dropped EXE
PID:712 -
C:\Users\Admin\AppData\Local\Temp\8U1JJ.exe"C:\Users\Admin\AppData\Local\Temp\8U1JJ.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:860 -
C:\Users\Admin\AppData\Local\Temp\384BX.exe"C:\Users\Admin\AppData\Local\Temp\384BX.exe"52⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\6EC8J.exe"C:\Users\Admin\AppData\Local\Temp\6EC8J.exe"53⤵
- Executes dropped EXE
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\FI1CA.exe"C:\Users\Admin\AppData\Local\Temp\FI1CA.exe"54⤵
- Executes dropped EXE
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\84REM.exe"C:\Users\Admin\AppData\Local\Temp\84REM.exe"55⤵
- Executes dropped EXE
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\1IE1G.exe"C:\Users\Admin\AppData\Local\Temp\1IE1G.exe"56⤵
- Executes dropped EXE
PID:244 -
C:\Users\Admin\AppData\Local\Temp\F6P66.exe"C:\Users\Admin\AppData\Local\Temp\F6P66.exe"57⤵
- Executes dropped EXE
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\36O1D.exe"C:\Users\Admin\AppData\Local\Temp\36O1D.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\W1Y49.exe"C:\Users\Admin\AppData\Local\Temp\W1Y49.exe"59⤵
- Executes dropped EXE
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\7558L.exe"C:\Users\Admin\AppData\Local\Temp\7558L.exe"60⤵
- Executes dropped EXE
PID:852 -
C:\Users\Admin\AppData\Local\Temp\EH6BJ.exe"C:\Users\Admin\AppData\Local\Temp\EH6BJ.exe"61⤵
- Executes dropped EXE
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\YG0RI.exe"C:\Users\Admin\AppData\Local\Temp\YG0RI.exe"62⤵
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\F9220.exe"C:\Users\Admin\AppData\Local\Temp\F9220.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\5KT3S.exe"C:\Users\Admin\AppData\Local\Temp\5KT3S.exe"64⤵
- Executes dropped EXE
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\XSBE7.exe"C:\Users\Admin\AppData\Local\Temp\XSBE7.exe"65⤵
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\V27U8.exe"C:\Users\Admin\AppData\Local\Temp\V27U8.exe"66⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\DKCE7.exe"C:\Users\Admin\AppData\Local\Temp\DKCE7.exe"67⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\DDWNY.exe"C:\Users\Admin\AppData\Local\Temp\DDWNY.exe"68⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\M3T3C.exe"C:\Users\Admin\AppData\Local\Temp\M3T3C.exe"69⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\2OOAG.exe"C:\Users\Admin\AppData\Local\Temp\2OOAG.exe"70⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\H2Q0G.exe"C:\Users\Admin\AppData\Local\Temp\H2Q0G.exe"71⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\TFSQ1.exe"C:\Users\Admin\AppData\Local\Temp\TFSQ1.exe"72⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\FB090.exe"C:\Users\Admin\AppData\Local\Temp\FB090.exe"73⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\P345O.exe"C:\Users\Admin\AppData\Local\Temp\P345O.exe"74⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\XJZKV.exe"C:\Users\Admin\AppData\Local\Temp\XJZKV.exe"75⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\219B9.exe"C:\Users\Admin\AppData\Local\Temp\219B9.exe"76⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\6A0JU.exe"C:\Users\Admin\AppData\Local\Temp\6A0JU.exe"77⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\63EBG.exe"C:\Users\Admin\AppData\Local\Temp\63EBG.exe"78⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\638I9.exe"C:\Users\Admin\AppData\Local\Temp\638I9.exe"79⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\I1D0L.exe"C:\Users\Admin\AppData\Local\Temp\I1D0L.exe"80⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\IX1C0.exe"C:\Users\Admin\AppData\Local\Temp\IX1C0.exe"81⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\0V9NE.exe"C:\Users\Admin\AppData\Local\Temp\0V9NE.exe"82⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\01412.exe"C:\Users\Admin\AppData\Local\Temp\01412.exe"83⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\2EMLH.exe"C:\Users\Admin\AppData\Local\Temp\2EMLH.exe"84⤵
- Checks computer location settings
PID:452 -
C:\Users\Admin\AppData\Local\Temp\VJ4R7.exe"C:\Users\Admin\AppData\Local\Temp\VJ4R7.exe"85⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\Z97TO.exe"C:\Users\Admin\AppData\Local\Temp\Z97TO.exe"86⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\3K59P.exe"C:\Users\Admin\AppData\Local\Temp\3K59P.exe"87⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\0H9K0.exe"C:\Users\Admin\AppData\Local\Temp\0H9K0.exe"88⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\1K5QC.exe"C:\Users\Admin\AppData\Local\Temp\1K5QC.exe"89⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\68IH3.exe"C:\Users\Admin\AppData\Local\Temp\68IH3.exe"90⤵
- Checks computer location settings
PID:632 -
C:\Users\Admin\AppData\Local\Temp\6PU12.exe"C:\Users\Admin\AppData\Local\Temp\6PU12.exe"91⤵
- Checks computer location settings
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\IHY8H.exe"C:\Users\Admin\AppData\Local\Temp\IHY8H.exe"92⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\Y814Q.exe"C:\Users\Admin\AppData\Local\Temp\Y814Q.exe"93⤵
- Checks computer location settings
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\W92Q6.exe"C:\Users\Admin\AppData\Local\Temp\W92Q6.exe"94⤵
- Checks computer location settings
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\3W102.exe"C:\Users\Admin\AppData\Local\Temp\3W102.exe"95⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\7F66J.exe"C:\Users\Admin\AppData\Local\Temp\7F66J.exe"96⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\ZIK65.exe"C:\Users\Admin\AppData\Local\Temp\ZIK65.exe"97⤵
- Checks computer location settings
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\5QB0U.exe"C:\Users\Admin\AppData\Local\Temp\5QB0U.exe"98⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\78D0M.exe"C:\Users\Admin\AppData\Local\Temp\78D0M.exe"99⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\H8055.exe"C:\Users\Admin\AppData\Local\Temp\H8055.exe"100⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\9LJI4.exe"C:\Users\Admin\AppData\Local\Temp\9LJI4.exe"101⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\P5G8N.exe"C:\Users\Admin\AppData\Local\Temp\P5G8N.exe"102⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\67ORK.exe"C:\Users\Admin\AppData\Local\Temp\67ORK.exe"103⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\7HIB8.exe"C:\Users\Admin\AppData\Local\Temp\7HIB8.exe"104⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\801U3.exe"C:\Users\Admin\AppData\Local\Temp\801U3.exe"105⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\8DPDR.exe"C:\Users\Admin\AppData\Local\Temp\8DPDR.exe"106⤵
- Checks computer location settings
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\3N7V7.exe"C:\Users\Admin\AppData\Local\Temp\3N7V7.exe"107⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\B47X9.exe"C:\Users\Admin\AppData\Local\Temp\B47X9.exe"108⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\8G604.exe"C:\Users\Admin\AppData\Local\Temp\8G604.exe"109⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\M355S.exe"C:\Users\Admin\AppData\Local\Temp\M355S.exe"110⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\PQ5EF.exe"C:\Users\Admin\AppData\Local\Temp\PQ5EF.exe"111⤵
- Checks computer location settings
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\2215Z.exe"C:\Users\Admin\AppData\Local\Temp\2215Z.exe"112⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\KJ7R2.exe"C:\Users\Admin\AppData\Local\Temp\KJ7R2.exe"113⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\KE7DN.exe"C:\Users\Admin\AppData\Local\Temp\KE7DN.exe"114⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\V41WH.exe"C:\Users\Admin\AppData\Local\Temp\V41WH.exe"115⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\ZYIZA.exe"C:\Users\Admin\AppData\Local\Temp\ZYIZA.exe"116⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\UXK0T.exe"C:\Users\Admin\AppData\Local\Temp\UXK0T.exe"117⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\1TK8A.exe"C:\Users\Admin\AppData\Local\Temp\1TK8A.exe"118⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\8277K.exe"C:\Users\Admin\AppData\Local\Temp\8277K.exe"119⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\ZSU17.exe"C:\Users\Admin\AppData\Local\Temp\ZSU17.exe"120⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\RACLX.exe"C:\Users\Admin\AppData\Local\Temp\RACLX.exe"121⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\5WM6X.exe"C:\Users\Admin\AppData\Local\Temp\5WM6X.exe"122⤵PID:4176
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-