Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 16:45
Static task
static1
Behavioral task
behavioral1
Sample
ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe
-
Size
196KB
-
MD5
ebf37135bc754177868244c8b1c6f600
-
SHA1
3b8cee2bc495ac2b1b01d0eaee8e5b5a29b0cd70
-
SHA256
2f8c2a3e9c56140414a1fa338feb3b3ac335e85fd15230d0a3d4e163ff29b2ae
-
SHA512
50269b220addc2beee45d6b0c3f9a16f75cfaff02e17ef1d43ce5539a5f7d41c65a6fc0709d4fce4b96f953eb32b917e7da021cf21fb925dd911a602cc8a817b
-
SSDEEP
6144:QzHV4QWvzvmjdZRlc4l3+lFyk0KBwTlui63h6vW/xxXc3o:+dl36Y+fPXc3
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (65) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tSMwcUAU.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\Geo\Nation tSMwcUAU.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1632 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
tSMwcUAU.exeRuoYUgsw.exepid process 1672 tSMwcUAU.exe 2132 RuoYUgsw.exe -
Loads dropped DLL 20 IoCs
Processes:
ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exetSMwcUAU.exepid process 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
tSMwcUAU.exeRuoYUgsw.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\tSMwcUAU.exe = "C:\\Users\\Admin\\mmYsUUMM\\tSMwcUAU.exe" tSMwcUAU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RuoYUgsw.exe = "C:\\ProgramData\\HGwwUEQk\\RuoYUgsw.exe" RuoYUgsw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\EwAQEwMY.exe = "C:\\Users\\Admin\\IsEgIskU\\EwAQEwMY.exe" ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\QkMMgkgk.exe = "C:\\ProgramData\\wsMEcAko\\QkMMgkgk.exe" ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\tSMwcUAU.exe = "C:\\Users\\Admin\\mmYsUUMM\\tSMwcUAU.exe" ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RuoYUgsw.exe = "C:\\ProgramData\\HGwwUEQk\\RuoYUgsw.exe" ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe -
Drops file in Windows directory 1 IoCs
Processes:
tSMwcUAU.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico tSMwcUAU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1952 2732 WerFault.exe EwAQEwMY.exe 2968 1984 WerFault.exe QkMMgkgk.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 2720 reg.exe 2828 reg.exe 2500 reg.exe 3044 reg.exe 2600 reg.exe 576 reg.exe 2000 reg.exe 1224 reg.exe 536 reg.exe 948 reg.exe 2640 reg.exe 2580 reg.exe 1692 reg.exe 2332 reg.exe 2564 reg.exe 1764 reg.exe 1028 reg.exe 1268 reg.exe 2968 reg.exe 2596 reg.exe 2780 reg.exe 988 reg.exe 1576 reg.exe 880 reg.exe 2172 reg.exe 2176 reg.exe 1904 reg.exe 1640 reg.exe 2252 reg.exe 2764 reg.exe 2452 reg.exe 3044 reg.exe 1972 reg.exe 2672 reg.exe 2160 reg.exe 1152 reg.exe 1556 reg.exe 3012 reg.exe 3052 reg.exe 948 reg.exe 1188 reg.exe 2160 reg.exe 3056 reg.exe 1440 reg.exe 2392 reg.exe 2120 reg.exe 1588 reg.exe 2652 reg.exe 448 reg.exe 2924 reg.exe 1512 reg.exe 1284 reg.exe 2532 reg.exe 1108 reg.exe 1232 reg.exe 3008 reg.exe 2028 reg.exe 2724 reg.exe 2500 reg.exe 1500 reg.exe 3032 reg.exe 1912 reg.exe 1896 reg.exe 1796 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exepid process 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1188 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1188 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2104 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2104 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 776 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 776 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1512 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1512 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2804 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2804 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1616 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1616 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1020 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1020 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1208 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1208 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2152 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2152 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 860 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 860 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2484 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2484 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1800 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1800 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1252 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1252 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2832 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2832 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2320 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2320 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2088 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2088 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2664 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2664 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1848 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1848 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 768 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 768 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 448 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 448 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2668 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2668 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2696 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2696 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1904 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1904 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2172 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2172 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1740 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1740 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1064 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1064 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 740 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 740 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2148 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2148 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2772 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2772 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2728 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2728 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
tSMwcUAU.exepid process 1672 tSMwcUAU.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
tSMwcUAU.exepid process 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe 1672 tSMwcUAU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.execmd.execmd.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.execmd.execmd.exedescription pid process target process PID 2268 wrote to memory of 1672 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe tSMwcUAU.exe PID 2268 wrote to memory of 1672 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe tSMwcUAU.exe PID 2268 wrote to memory of 1672 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe tSMwcUAU.exe PID 2268 wrote to memory of 1672 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe tSMwcUAU.exe PID 2268 wrote to memory of 2132 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe RuoYUgsw.exe PID 2268 wrote to memory of 2132 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe RuoYUgsw.exe PID 2268 wrote to memory of 2132 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe RuoYUgsw.exe PID 2268 wrote to memory of 2132 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe RuoYUgsw.exe PID 2268 wrote to memory of 2676 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2268 wrote to memory of 2676 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2268 wrote to memory of 2676 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2268 wrote to memory of 2676 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2676 wrote to memory of 2612 2676 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 2676 wrote to memory of 2612 2676 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 2676 wrote to memory of 2612 2676 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 2676 wrote to memory of 2612 2676 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 2268 wrote to memory of 2664 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2268 wrote to memory of 2664 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2268 wrote to memory of 2664 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2268 wrote to memory of 2664 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2268 wrote to memory of 2968 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2268 wrote to memory of 2968 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2268 wrote to memory of 2968 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2268 wrote to memory of 2968 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2268 wrote to memory of 2580 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2268 wrote to memory of 2580 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2268 wrote to memory of 2580 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2268 wrote to memory of 2580 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2268 wrote to memory of 2552 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2268 wrote to memory of 2552 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2268 wrote to memory of 2552 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2268 wrote to memory of 2552 2268 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2552 wrote to memory of 2460 2552 cmd.exe cscript.exe PID 2552 wrote to memory of 2460 2552 cmd.exe cscript.exe PID 2552 wrote to memory of 2460 2552 cmd.exe cscript.exe PID 2552 wrote to memory of 2460 2552 cmd.exe cscript.exe PID 2612 wrote to memory of 1532 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2612 wrote to memory of 1532 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2612 wrote to memory of 1532 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2612 wrote to memory of 1532 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 1532 wrote to memory of 1188 1532 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 1532 wrote to memory of 1188 1532 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 1532 wrote to memory of 1188 1532 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 1532 wrote to memory of 1188 1532 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 2612 wrote to memory of 1436 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2612 wrote to memory of 1436 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2612 wrote to memory of 1436 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2612 wrote to memory of 1436 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2612 wrote to memory of 1692 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2612 wrote to memory of 1692 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2612 wrote to memory of 1692 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2612 wrote to memory of 1692 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2612 wrote to memory of 2452 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2612 wrote to memory of 2452 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2612 wrote to memory of 2452 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2612 wrote to memory of 2452 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 2612 wrote to memory of 1612 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2612 wrote to memory of 1612 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2612 wrote to memory of 1612 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2612 wrote to memory of 1612 2612 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 1612 wrote to memory of 956 1612 cmd.exe cscript.exe PID 1612 wrote to memory of 956 1612 cmd.exe cscript.exe PID 1612 wrote to memory of 956 1612 cmd.exe cscript.exe PID 1612 wrote to memory of 956 1612 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\mmYsUUMM\tSMwcUAU.exe"C:\Users\Admin\mmYsUUMM\tSMwcUAU.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1672
-
-
C:\ProgramData\HGwwUEQk\RuoYUgsw.exe"C:\ProgramData\HGwwUEQk\RuoYUgsw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2132
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"2⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"4⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1188 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"6⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"8⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics9⤵
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"10⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"12⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"14⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"16⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"18⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"20⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"22⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics23⤵
- Suspicious behavior: EnumeratesProcesses
PID:860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"24⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics25⤵
- Adds Run key to start application
PID:2920 -
C:\Users\Admin\IsEgIskU\EwAQEwMY.exe"C:\Users\Admin\IsEgIskU\EwAQEwMY.exe"26⤵PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 3627⤵
- Program crash
PID:1952
-
-
-
C:\ProgramData\wsMEcAko\QkMMgkgk.exe"C:\ProgramData\wsMEcAko\QkMMgkgk.exe"26⤵PID:1984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 3627⤵
- Program crash
PID:2968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"26⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"28⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"30⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1252 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"32⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"34⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"36⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"38⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"40⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"42⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics43⤵
- Suspicious behavior: EnumeratesProcesses
PID:768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"44⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics45⤵
- Suspicious behavior: EnumeratesProcesses
PID:448 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"46⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"48⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"50⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"52⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"54⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"56⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1064 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"58⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics59⤵
- Suspicious behavior: EnumeratesProcesses
PID:740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"60⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"62⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"64⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics65⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"66⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics67⤵PID:1224
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"68⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics69⤵PID:2260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"70⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics71⤵PID:1632
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"72⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics73⤵PID:1184
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"74⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics75⤵PID:2784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"76⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics77⤵PID:2764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"78⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics79⤵PID:3024
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"80⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics81⤵PID:2640
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"82⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics83⤵PID:2668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"84⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics85⤵PID:1800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"86⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics87⤵PID:2192
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"88⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics89⤵PID:108
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"90⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics91⤵PID:1624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"92⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics93⤵PID:2588
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"94⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics95⤵PID:1236
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"96⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics97⤵PID:2520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"98⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics99⤵PID:2912
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"100⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics101⤵PID:1700
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"102⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics103⤵PID:1588
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"104⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics105⤵PID:1296
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"106⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics107⤵PID:2332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"108⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics109⤵PID:2428
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"110⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics111⤵PID:2916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"112⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics113⤵PID:1500
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"114⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics115⤵PID:352
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"116⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics117⤵PID:2772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"118⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics119⤵PID:2704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"120⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics121⤵PID:1496
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"122⤵PID:2452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-