Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 16:45
Static task
static1
Behavioral task
behavioral1
Sample
ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe
-
Size
196KB
-
MD5
ebf37135bc754177868244c8b1c6f600
-
SHA1
3b8cee2bc495ac2b1b01d0eaee8e5b5a29b0cd70
-
SHA256
2f8c2a3e9c56140414a1fa338feb3b3ac335e85fd15230d0a3d4e163ff29b2ae
-
SHA512
50269b220addc2beee45d6b0c3f9a16f75cfaff02e17ef1d43ce5539a5f7d41c65a6fc0709d4fce4b96f953eb32b917e7da021cf21fb925dd911a602cc8a817b
-
SSDEEP
6144:QzHV4QWvzvmjdZRlc4l3+lFyk0KBwTlui63h6vW/xxXc3o:+dl36Y+fPXc3
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (80) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wOEgMYgc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation wOEgMYgc.exe -
Executes dropped EXE 2 IoCs
Processes:
wOEgMYgc.exeissIocYw.exepid process 1852 wOEgMYgc.exe 4884 issIocYw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exewOEgMYgc.exeissIocYw.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wOEgMYgc.exe = "C:\\Users\\Admin\\RwUEUogA\\wOEgMYgc.exe" ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\issIocYw.exe = "C:\\ProgramData\\QmoYckIo\\issIocYw.exe" ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wOEgMYgc.exe = "C:\\Users\\Admin\\RwUEUogA\\wOEgMYgc.exe" wOEgMYgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\issIocYw.exe = "C:\\ProgramData\\QmoYckIo\\issIocYw.exe" issIocYw.exe -
Drops file in System32 directory 2 IoCs
Processes:
wOEgMYgc.exedescription ioc process File created C:\Windows\SysWOW64\shell32.dll.exe wOEgMYgc.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe wOEgMYgc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 3648 reg.exe 1592 reg.exe 224 reg.exe 5100 reg.exe 868 reg.exe 2260 4004 reg.exe 2360 reg.exe 2704 reg.exe 1992 reg.exe 2768 reg.exe 1976 reg.exe 4596 reg.exe 928 reg.exe 3096 reg.exe 824 reg.exe 2480 reg.exe 3976 reg.exe 3012 2444 reg.exe 1196 2292 reg.exe 4128 reg.exe 3308 reg.exe 4912 reg.exe 2000 3296 2000 reg.exe 1008 4412 2032 reg.exe 3468 reg.exe 2064 reg.exe 4476 888 reg.exe 5084 reg.exe 888 reg.exe 4520 reg.exe 2444 reg.exe 3940 reg.exe 4580 reg.exe 1068 reg.exe 1628 reg.exe 208 reg.exe 1704 reg.exe 2092 reg.exe 4744 reg.exe 2704 reg.exe 3932 reg.exe 3708 4688 reg.exe 1724 reg.exe 2284 reg.exe 2544 reg.exe 1648 reg.exe 3848 reg.exe 3852 reg.exe 2284 reg.exe 3452 reg.exe 1404 reg.exe 4792 reg.exe 4352 reg.exe 4520 reg.exe 4128 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exepid process 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 780 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 780 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 780 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 780 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3656 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3656 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3656 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3656 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 208 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 208 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 208 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 208 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4816 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4816 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4816 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4816 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 5052 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 5052 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 5052 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 5052 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2176 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2176 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2176 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2176 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3388 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3388 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3388 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3388 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1668 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1668 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1668 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1668 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3168 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3168 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3168 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 3168 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4296 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4296 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4296 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4296 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4572 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4572 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4572 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 4572 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2640 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2640 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2640 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 2640 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1876 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1876 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1876 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe 1876 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
wOEgMYgc.exepid process 1852 wOEgMYgc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
wOEgMYgc.exepid process 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe 1852 wOEgMYgc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.execmd.execmd.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.execmd.execmd.exeebf37135bc754177868244c8b1c6f600_NeikiAnalytics.execmd.exedescription pid process target process PID 972 wrote to memory of 1852 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe wOEgMYgc.exe PID 972 wrote to memory of 1852 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe wOEgMYgc.exe PID 972 wrote to memory of 1852 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe wOEgMYgc.exe PID 972 wrote to memory of 4884 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe issIocYw.exe PID 972 wrote to memory of 4884 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe issIocYw.exe PID 972 wrote to memory of 4884 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe issIocYw.exe PID 972 wrote to memory of 3768 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 972 wrote to memory of 3768 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 972 wrote to memory of 3768 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 972 wrote to memory of 4004 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 972 wrote to memory of 4004 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 972 wrote to memory of 4004 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 972 wrote to memory of 3548 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 972 wrote to memory of 3548 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 972 wrote to memory of 3548 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 972 wrote to memory of 5060 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 972 wrote to memory of 5060 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 972 wrote to memory of 5060 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 972 wrote to memory of 1012 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 972 wrote to memory of 1012 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 972 wrote to memory of 1012 972 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 3768 wrote to memory of 3432 3768 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 3768 wrote to memory of 3432 3768 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 3768 wrote to memory of 3432 3768 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 1012 wrote to memory of 404 1012 cmd.exe cscript.exe PID 1012 wrote to memory of 404 1012 cmd.exe cscript.exe PID 1012 wrote to memory of 404 1012 cmd.exe cscript.exe PID 3432 wrote to memory of 1280 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 3432 wrote to memory of 1280 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 3432 wrote to memory of 1280 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 1280 wrote to memory of 4704 1280 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 1280 wrote to memory of 4704 1280 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 1280 wrote to memory of 4704 1280 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 3432 wrote to memory of 3776 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 3432 wrote to memory of 3776 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 3432 wrote to memory of 3776 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 3432 wrote to memory of 4744 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 3432 wrote to memory of 4744 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 3432 wrote to memory of 4744 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 3432 wrote to memory of 4204 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 3432 wrote to memory of 4204 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 3432 wrote to memory of 4204 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 3432 wrote to memory of 4468 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 3432 wrote to memory of 4468 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 3432 wrote to memory of 4468 3432 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 4468 wrote to memory of 3332 4468 cmd.exe cscript.exe PID 4468 wrote to memory of 3332 4468 cmd.exe cscript.exe PID 4468 wrote to memory of 3332 4468 cmd.exe cscript.exe PID 4704 wrote to memory of 2724 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 4704 wrote to memory of 2724 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 4704 wrote to memory of 2724 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe PID 2724 wrote to memory of 780 2724 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 2724 wrote to memory of 780 2724 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 2724 wrote to memory of 780 2724 cmd.exe ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe PID 4704 wrote to memory of 4944 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 4704 wrote to memory of 4944 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 4704 wrote to memory of 4944 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 4704 wrote to memory of 3940 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 4704 wrote to memory of 3940 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 4704 wrote to memory of 3940 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 4704 wrote to memory of 1664 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 4704 wrote to memory of 1664 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 4704 wrote to memory of 1664 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe reg.exe PID 4704 wrote to memory of 1512 4704 ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\RwUEUogA\wOEgMYgc.exe"C:\Users\Admin\RwUEUogA\wOEgMYgc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1852
-
-
C:\ProgramData\QmoYckIo\issIocYw.exe"C:\ProgramData\QmoYckIo\issIocYw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"2⤵
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"4⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"6⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics7⤵
- Suspicious behavior: EnumeratesProcesses
PID:780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"8⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"10⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics11⤵
- Suspicious behavior: EnumeratesProcesses
PID:208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"12⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"14⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics15⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"16⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"18⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"20⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"22⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"24⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"26⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"28⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"30⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"32⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics33⤵PID:2196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"34⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics35⤵PID:4440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"36⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics37⤵PID:3120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"38⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics39⤵PID:3848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"40⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics41⤵PID:2752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"42⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics43⤵PID:4816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"44⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics45⤵PID:2544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"46⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics47⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"48⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics49⤵PID:4604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"50⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics51⤵PID:3648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"52⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics53⤵PID:2984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"54⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics55⤵PID:1816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"56⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics57⤵PID:888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"58⤵PID:2032
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics59⤵PID:3488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"60⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics61⤵PID:4048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"62⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics63⤵PID:2808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"64⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics65⤵PID:4336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"66⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics67⤵PID:1212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"68⤵PID:4008
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics69⤵PID:2852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"70⤵PID:1288
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics71⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"72⤵PID:548
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics73⤵PID:388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"74⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics75⤵PID:4580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"76⤵PID:4476
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics77⤵PID:4048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"78⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics79⤵PID:2968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"80⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics81⤵PID:4940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"82⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics83⤵PID:2484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"84⤵PID:1648
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics85⤵PID:4360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"86⤵PID:780
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics87⤵PID:3076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"88⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics89⤵PID:3332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"90⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics91⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"92⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics93⤵PID:4704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"94⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics95⤵PID:4544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"96⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics97⤵PID:2220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"98⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics99⤵PID:3196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"100⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics101⤵PID:1276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"102⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics103⤵PID:1792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"104⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics105⤵PID:5004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"106⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics107⤵PID:4084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"108⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics109⤵PID:2208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"110⤵PID:2336
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics111⤵PID:4912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"112⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics113⤵PID:548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"114⤵PID:4864
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:4336
-
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics115⤵PID:432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"116⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics117⤵PID:4296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"118⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics119⤵PID:3412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"120⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics121⤵PID:464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ebf37135bc754177868244c8b1c6f600_NeikiAnalytics"122⤵PID:4236
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-