Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 03:40
Static task
static1
Behavioral task
behavioral1
Sample
4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe
-
Size
204KB
-
MD5
4dc57d384dfb9b282c0f14dceaadaf00
-
SHA1
e8b5f4c910844cbe6aac681718be339e5de45837
-
SHA256
ba4b6087e008000e825f8b9f1f7337cfd7ee0e49b513d918da71412fb6d536bd
-
SHA512
a970fee38e7117da3200c22acda173f1b1de6dfc3b313cb957ca25469002b05a0b6a24c8a54fa3666daae75956c6176c0affe9343940182ab95fc17cd08ca1ab
-
SSDEEP
3072:+45yU08b7VR+jgHL3F6rEQuxir0X2q1jY4b8upWJbuOWY3sdoma5DbUolDjr:d5yc2sWO1jiWYxDbUQ
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (82) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 1 IoCs
Processes:
cmd.exeflow pid process 46 664 cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qYIUEIMI.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation qYIUEIMI.exe -
Executes dropped EXE 2 IoCs
Processes:
qYIUEIMI.exeXCgwcwgc.exepid process 1684 qYIUEIMI.exe 1512 XCgwcwgc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
qYIUEIMI.exeXCgwcwgc.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qYIUEIMI.exe = "C:\\Users\\Admin\\ZSIcYcgQ\\qYIUEIMI.exe" qYIUEIMI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XCgwcwgc.exe = "C:\\ProgramData\\uEMAkYkY\\XCgwcwgc.exe" XCgwcwgc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IiEgkQIM.exe = "C:\\Users\\Admin\\JkAAAEwU\\IiEgkQIM.exe" 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SUEAAIsM.exe = "C:\\ProgramData\\lAoMQcsw\\SUEAAIsM.exe" 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qYIUEIMI.exe = "C:\\Users\\Admin\\ZSIcYcgQ\\qYIUEIMI.exe" 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XCgwcwgc.exe = "C:\\ProgramData\\uEMAkYkY\\XCgwcwgc.exe" 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe -
Drops file in System32 directory 2 IoCs
Processes:
qYIUEIMI.exedescription ioc process File created C:\Windows\SysWOW64\shell32.dll.exe qYIUEIMI.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe qYIUEIMI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3512 2164 WerFault.exe IiEgkQIM.exe 3016 4896 WerFault.exe SUEAAIsM.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1332 reg.exe 1584 reg.exe 2308 reg.exe 2652 reg.exe 4280 1252 2556 3784 reg.exe 2680 reg.exe 780 reg.exe 1444 reg.exe 3764 reg.exe 2804 reg.exe 4892 reg.exe 4996 reg.exe 2432 2308 reg.exe 1524 reg.exe 4028 reg.exe 388 reg.exe 3472 reg.exe 1496 reg.exe 1664 reg.exe 2304 reg.exe 2224 reg.exe 1632 reg.exe 868 4380 reg.exe 2676 reg.exe 5040 reg.exe 3240 reg.exe 4936 reg.exe 2704 reg.exe 4508 3712 2552 reg.exe 2568 reg.exe 3936 reg.exe 3752 reg.exe 4900 reg.exe 2988 reg.exe 2056 reg.exe 4944 reg.exe 3008 reg.exe 3752 reg.exe 4672 528 reg.exe 872 reg.exe 600 reg.exe 3716 reg.exe 2432 reg.exe 3268 reg.exe 2492 2572 reg.exe 3660 reg.exe 3932 reg.exe 1980 reg.exe 756 reg.exe 2896 reg.exe 3816 reg.exe 1632 reg.exe 1608 reg.exe 4944 reg.exe 1236 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exepid process 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4332 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4332 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4332 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4332 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4536 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4536 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4536 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4536 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 316 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 316 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 316 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 316 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 1592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 1592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 1592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 1592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 3832 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 3832 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 3832 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 3832 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 376 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 376 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 376 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 376 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 216 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 216 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 216 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 216 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 2364 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 2364 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 2364 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 2364 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 5100 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 5100 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 5100 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 5100 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4424 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4424 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4424 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4424 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4928 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4928 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4928 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4928 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 1492 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 1492 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 1492 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 1492 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4608 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4608 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4608 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe 4608 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
qYIUEIMI.exepid process 1684 qYIUEIMI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
qYIUEIMI.exepid process 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe 1684 qYIUEIMI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.execmd.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.execmd.execmd.execmd.exe4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.execmd.exedescription pid process target process PID 388 wrote to memory of 1684 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe qYIUEIMI.exe PID 388 wrote to memory of 1684 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe qYIUEIMI.exe PID 388 wrote to memory of 1684 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe qYIUEIMI.exe PID 388 wrote to memory of 1512 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe XCgwcwgc.exe PID 388 wrote to memory of 1512 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe XCgwcwgc.exe PID 388 wrote to memory of 1512 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe XCgwcwgc.exe PID 388 wrote to memory of 864 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 388 wrote to memory of 864 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 388 wrote to memory of 864 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 864 wrote to memory of 3592 864 cmd.exe 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe PID 864 wrote to memory of 3592 864 cmd.exe 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe PID 864 wrote to memory of 3592 864 cmd.exe 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe PID 388 wrote to memory of 4216 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 388 wrote to memory of 4216 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 388 wrote to memory of 4216 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 388 wrote to memory of 1524 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 388 wrote to memory of 1524 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 388 wrote to memory of 1524 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 388 wrote to memory of 2572 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 388 wrote to memory of 2572 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 388 wrote to memory of 2572 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 388 wrote to memory of 1336 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 388 wrote to memory of 1336 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 388 wrote to memory of 1336 388 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 3592 wrote to memory of 5000 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 3592 wrote to memory of 5000 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 3592 wrote to memory of 5000 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 3592 wrote to memory of 4388 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 3592 wrote to memory of 4388 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 3592 wrote to memory of 4388 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 3592 wrote to memory of 3268 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 3592 wrote to memory of 3268 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 3592 wrote to memory of 3268 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 3592 wrote to memory of 5024 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 3592 wrote to memory of 5024 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 3592 wrote to memory of 5024 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 3592 wrote to memory of 2068 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 3592 wrote to memory of 2068 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 3592 wrote to memory of 2068 3592 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 5000 wrote to memory of 1472 5000 cmd.exe 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe PID 5000 wrote to memory of 1472 5000 cmd.exe 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe PID 5000 wrote to memory of 1472 5000 cmd.exe 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe PID 2068 wrote to memory of 3832 2068 cmd.exe cscript.exe PID 2068 wrote to memory of 3832 2068 cmd.exe cscript.exe PID 2068 wrote to memory of 3832 2068 cmd.exe cscript.exe PID 1336 wrote to memory of 1016 1336 cmd.exe cscript.exe PID 1336 wrote to memory of 1016 1336 cmd.exe cscript.exe PID 1336 wrote to memory of 1016 1336 cmd.exe cscript.exe PID 1472 wrote to memory of 4424 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 1472 wrote to memory of 4424 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 1472 wrote to memory of 4424 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe PID 4424 wrote to memory of 4332 4424 cmd.exe 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe PID 4424 wrote to memory of 4332 4424 cmd.exe 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe PID 4424 wrote to memory of 4332 4424 cmd.exe 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe PID 1472 wrote to memory of 3292 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 1472 wrote to memory of 3292 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 1472 wrote to memory of 3292 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 1472 wrote to memory of 3744 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 1472 wrote to memory of 3744 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 1472 wrote to memory of 3744 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 1472 wrote to memory of 4248 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 1472 wrote to memory of 4248 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 1472 wrote to memory of 4248 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe reg.exe PID 1472 wrote to memory of 3464 1472 4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\ZSIcYcgQ\qYIUEIMI.exe"C:\Users\Admin\ZSIcYcgQ\qYIUEIMI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1684
-
-
C:\ProgramData\uEMAkYkY\XCgwcwgc.exe"C:\ProgramData\uEMAkYkY\XCgwcwgc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"2⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"4⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"6⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"8⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"10⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics11⤵
- Suspicious behavior: EnumeratesProcesses
PID:316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"12⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"14⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"16⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics17⤵
- Suspicious behavior: EnumeratesProcesses
PID:376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"18⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics19⤵
- Suspicious behavior: EnumeratesProcesses
PID:216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"20⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"22⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"24⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"26⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"28⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"30⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"32⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics33⤵PID:2376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"34⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics35⤵PID:2520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"36⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics37⤵PID:1928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"38⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics39⤵PID:2372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"40⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics41⤵PID:4944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"42⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics43⤵PID:2980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"44⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics45⤵PID:1612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"46⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics47⤵PID:3708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"48⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics49⤵PID:4644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"50⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics51⤵PID:3744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"52⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics53⤵PID:1492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"54⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics55⤵PID:4048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"56⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics57⤵PID:2372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"58⤵PID:4220
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics59⤵PID:2736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"60⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics61⤵PID:3464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"62⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics63⤵PID:4004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"64⤵PID:1844
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV165⤵PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics65⤵PID:600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"66⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics67⤵PID:3320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"68⤵PID:3860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics69⤵PID:2108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"70⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics71⤵PID:3472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"72⤵PID:316
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics73⤵PID:3292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"74⤵PID:1060
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics75⤵PID:1236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"76⤵PID:3064
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:1044
-
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics77⤵PID:2768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"78⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics79⤵
- Adds Run key to start application
PID:2312 -
C:\Users\Admin\JkAAAEwU\IiEgkQIM.exe"C:\Users\Admin\JkAAAEwU\IiEgkQIM.exe"80⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 22481⤵
- Program crash
PID:3512
-
-
-
C:\ProgramData\lAoMQcsw\SUEAAIsM.exe"C:\ProgramData\lAoMQcsw\SUEAAIsM.exe"80⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 22481⤵
- Program crash
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"80⤵PID:4876
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics81⤵PID:2364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"82⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics83⤵PID:3612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"84⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics85⤵PID:452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"86⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics87⤵PID:5100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"88⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics89⤵PID:3016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"90⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics91⤵PID:1632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"92⤵PID:976
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics93⤵PID:2600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"94⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics95⤵PID:1236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"96⤵PID:2056
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV197⤵PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics97⤵PID:316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"98⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics99⤵PID:2308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"100⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics101⤵PID:2924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"102⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics103⤵PID:600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"104⤵PID:3016
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics105⤵PID:5024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"106⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics107⤵PID:3584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"108⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics109⤵PID:4164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"110⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics111⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"112⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics113⤵PID:4400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"114⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics115⤵PID:4204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"116⤵PID:2704
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics117⤵PID:1584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"118⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics119⤵PID:3216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"120⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics121⤵PID:2604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc57d384dfb9b282c0f14dceaadaf00_NeikiAnalytics"122⤵PID:2336
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-