Analysis
-
max time kernel
7s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 15:58
Static task
static1
Behavioral task
behavioral1
Sample
4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe
-
Size
1.5MB
-
MD5
4c7adf51d74764fc83d628e9a8cc9c60
-
SHA1
1a304eab976069218440a5aa9d4ec3a3d89638d8
-
SHA256
b24d01edb8b76471a6c715b3a8c76d91a20465cea1c5f3a07d3d47f0ea6ccd90
-
SHA512
b1a41d266c6b685de4b1bd62ff3048c30e9032a65942f4444c9873ba84dc273c447f27a4a5685d29ba345d5346a7fa95e4cad254f7c5ef904f5f4306a0923009
-
SSDEEP
24576:XuhYGACNtzlz116k7GXySXNY/zOQb/WV6VDyXi4M7bxKfeJpfSSj1:XuhplNtzlz1MyS7XNySmOVcDyM5tDN1
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exeXP-FEBFA1C7.EXEdescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" XP-FEBFA1C7.EXE Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" XP-FEBFA1C7.EXE Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" XP-FEBFA1C7.EXE -
Processes:
4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exeXP-FEBFA1C7.EXEdescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" XP-FEBFA1C7.EXE -
Processes:
XP-FEBFA1C7.EXE4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" XP-FEBFA1C7.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" XP-FEBFA1C7.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" XP-FEBFA1C7.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" XP-FEBFA1C7.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" XP-FEBFA1C7.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" XP-FEBFA1C7.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe -
Executes dropped EXE 6 IoCs
Processes:
XP-FEBFA1C7.EXEXP-FEBFA1C7.EXEXP-FEBFA1C7.EXEXP-FEBFA1C7.EXEXP-FEBFA1C7.EXEXP-FEBFA1C7.EXEpid process 3604 XP-FEBFA1C7.EXE 4768 XP-FEBFA1C7.EXE 372 XP-FEBFA1C7.EXE 3644 XP-FEBFA1C7.EXE 1052 XP-FEBFA1C7.EXE 4184 XP-FEBFA1C7.EXE -
Loads dropped DLL 43 IoCs
Processes:
4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exeXP-FEBFA1C7.EXEXP-FEBFA1C7.EXEXP-FEBFA1C7.EXEXP-FEBFA1C7.EXEXP-FEBFA1C7.EXEXP-FEBFA1C7.EXEpid process 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 3604 XP-FEBFA1C7.EXE 3604 XP-FEBFA1C7.EXE 3604 XP-FEBFA1C7.EXE 3604 XP-FEBFA1C7.EXE 3604 XP-FEBFA1C7.EXE 3604 XP-FEBFA1C7.EXE 3604 XP-FEBFA1C7.EXE 4768 XP-FEBFA1C7.EXE 4768 XP-FEBFA1C7.EXE 4768 XP-FEBFA1C7.EXE 4768 XP-FEBFA1C7.EXE 4768 XP-FEBFA1C7.EXE 4768 XP-FEBFA1C7.EXE 4768 XP-FEBFA1C7.EXE 372 XP-FEBFA1C7.EXE 372 XP-FEBFA1C7.EXE 372 XP-FEBFA1C7.EXE 372 XP-FEBFA1C7.EXE 372 XP-FEBFA1C7.EXE 372 XP-FEBFA1C7.EXE 372 XP-FEBFA1C7.EXE 3644 XP-FEBFA1C7.EXE 3644 XP-FEBFA1C7.EXE 3644 XP-FEBFA1C7.EXE 3644 XP-FEBFA1C7.EXE 3644 XP-FEBFA1C7.EXE 3644 XP-FEBFA1C7.EXE 3644 XP-FEBFA1C7.EXE 1052 XP-FEBFA1C7.EXE 1052 XP-FEBFA1C7.EXE 1052 XP-FEBFA1C7.EXE 1052 XP-FEBFA1C7.EXE 1052 XP-FEBFA1C7.EXE 1052 XP-FEBFA1C7.EXE 1052 XP-FEBFA1C7.EXE 4184 XP-FEBFA1C7.EXE -
Processes:
resource yara_rule behavioral2/memory/668-4-0x00000000021A0000-0x000000000325A000-memory.dmp upx behavioral2/memory/668-18-0x00000000021A0000-0x000000000325A000-memory.dmp upx behavioral2/memory/668-19-0x00000000021A0000-0x000000000325A000-memory.dmp upx behavioral2/memory/668-1-0x00000000021A0000-0x000000000325A000-memory.dmp upx behavioral2/memory/668-3-0x00000000021A0000-0x000000000325A000-memory.dmp upx behavioral2/memory/668-5-0x00000000021A0000-0x000000000325A000-memory.dmp upx behavioral2/memory/668-20-0x00000000021A0000-0x000000000325A000-memory.dmp upx behavioral2/memory/668-33-0x00000000021A0000-0x000000000325A000-memory.dmp upx behavioral2/memory/668-30-0x00000000021A0000-0x000000000325A000-memory.dmp upx behavioral2/memory/668-39-0x00000000021A0000-0x000000000325A000-memory.dmp upx behavioral2/memory/668-61-0x00000000021A0000-0x000000000325A000-memory.dmp upx behavioral2/memory/668-70-0x00000000021A0000-0x000000000325A000-memory.dmp upx behavioral2/memory/668-96-0x00000000021A0000-0x000000000325A000-memory.dmp upx behavioral2/memory/668-136-0x00000000021A0000-0x000000000325A000-memory.dmp upx behavioral2/memory/3644-178-0x00000000021C0000-0x000000000327A000-memory.dmp upx behavioral2/memory/3644-175-0x00000000021C0000-0x000000000327A000-memory.dmp upx behavioral2/memory/3644-174-0x00000000021C0000-0x000000000327A000-memory.dmp upx behavioral2/memory/3644-171-0x00000000021C0000-0x000000000327A000-memory.dmp upx behavioral2/memory/3644-170-0x00000000021C0000-0x000000000327A000-memory.dmp upx behavioral2/memory/3644-173-0x00000000021C0000-0x000000000327A000-memory.dmp upx behavioral2/memory/3644-172-0x00000000021C0000-0x000000000327A000-memory.dmp upx behavioral2/memory/3644-169-0x00000000021C0000-0x000000000327A000-memory.dmp upx behavioral2/memory/3644-155-0x00000000021C0000-0x000000000327A000-memory.dmp upx behavioral2/memory/3644-211-0x00000000021C0000-0x000000000327A000-memory.dmp upx behavioral2/memory/3644-210-0x00000000021C0000-0x000000000327A000-memory.dmp upx behavioral2/memory/3644-153-0x00000000021C0000-0x000000000327A000-memory.dmp upx behavioral2/memory/3644-231-0x00000000021C0000-0x000000000327A000-memory.dmp upx -
Processes:
4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exeXP-FEBFA1C7.EXEdescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" XP-FEBFA1C7.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" XP-FEBFA1C7.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" XP-FEBFA1C7.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc XP-FEBFA1C7.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" XP-FEBFA1C7.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" XP-FEBFA1C7.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" XP-FEBFA1C7.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe -
Processes:
4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exeXP-FEBFA1C7.EXEdescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" XP-FEBFA1C7.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 6 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
XP-FEBFA1C7.EXEXP-FEBFA1C7.EXEXP-FEBFA1C7.EXE4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exeXP-FEBFA1C7.EXEXP-FEBFA1C7.EXEdescription ioc process File opened for modification \??\PhysicalDrive0 XP-FEBFA1C7.EXE File opened for modification \??\PhysicalDrive0 XP-FEBFA1C7.EXE File opened for modification \??\PhysicalDrive0 XP-FEBFA1C7.EXE File opened for modification \??\PhysicalDrive0 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe File opened for modification \??\PhysicalDrive0 XP-FEBFA1C7.EXE File opened for modification \??\PhysicalDrive0 XP-FEBFA1C7.EXE -
Drops file in System32 directory 2 IoCs
Processes:
4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exedescription ioc process File created C:\Windows\SysWOW64\XP-FEBFA1C7.EXE 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\XP-FEBFA1C7.EXE 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe -
Drops file in Windows directory 3 IoCs
Processes:
4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exeXP-FEBFA1C7.EXEdescription ioc process File created C:\Windows\e57466f 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe File opened for modification C:\Windows\SYSTEM.INI 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe File created C:\Windows\e57568c XP-FEBFA1C7.EXE -
Processes:
explorer.exeexplorer.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 49 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exepid process 3176 explorer.exe 4168 explorer.exe 3372 explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exeXP-FEBFA1C7.EXEpid process 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 3644 XP-FEBFA1C7.EXE 3644 XP-FEBFA1C7.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Token: SeDebugPrivilege 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 42 IoCs
Processes:
4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exeXP-FEBFA1C7.EXEexplorer.exeXP-FEBFA1C7.EXEXP-FEBFA1C7.EXEexplorer.exeXP-FEBFA1C7.EXEexplorer.exeXP-FEBFA1C7.EXEpid process 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe 3604 XP-FEBFA1C7.EXE 3604 XP-FEBFA1C7.EXE 3176 explorer.exe 3176 explorer.exe 3604 XP-FEBFA1C7.EXE 3604 XP-FEBFA1C7.EXE 3604 XP-FEBFA1C7.EXE 3604 XP-FEBFA1C7.EXE 4768 XP-FEBFA1C7.EXE 4768 XP-FEBFA1C7.EXE 4768 XP-FEBFA1C7.EXE 4768 XP-FEBFA1C7.EXE 4768 XP-FEBFA1C7.EXE 4768 XP-FEBFA1C7.EXE 372 XP-FEBFA1C7.EXE 372 XP-FEBFA1C7.EXE 4168 explorer.exe 4168 explorer.exe 372 XP-FEBFA1C7.EXE 372 XP-FEBFA1C7.EXE 372 XP-FEBFA1C7.EXE 372 XP-FEBFA1C7.EXE 3644 XP-FEBFA1C7.EXE 3644 XP-FEBFA1C7.EXE 3644 XP-FEBFA1C7.EXE 3644 XP-FEBFA1C7.EXE 3644 XP-FEBFA1C7.EXE 3372 explorer.exe 3372 explorer.exe 3644 XP-FEBFA1C7.EXE 1052 XP-FEBFA1C7.EXE 1052 XP-FEBFA1C7.EXE 1052 XP-FEBFA1C7.EXE 1052 XP-FEBFA1C7.EXE 1052 XP-FEBFA1C7.EXE 1052 XP-FEBFA1C7.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exeXP-FEBFA1C7.EXEXP-FEBFA1C7.EXEXP-FEBFA1C7.EXEXP-FEBFA1C7.EXEdescription pid process target process PID 668 wrote to memory of 772 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe fontdrvhost.exe PID 668 wrote to memory of 776 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe fontdrvhost.exe PID 668 wrote to memory of 380 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe dwm.exe PID 668 wrote to memory of 2688 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe sihost.exe PID 668 wrote to memory of 2804 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe svchost.exe PID 668 wrote to memory of 3036 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe taskhostw.exe PID 668 wrote to memory of 3552 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Explorer.EXE PID 668 wrote to memory of 3672 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe svchost.exe PID 668 wrote to memory of 3860 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe DllHost.exe PID 668 wrote to memory of 4044 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 668 wrote to memory of 1060 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe RuntimeBroker.exe PID 668 wrote to memory of 2884 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe SearchApp.exe PID 668 wrote to memory of 3780 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe RuntimeBroker.exe PID 668 wrote to memory of 468 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe TextInputHost.exe PID 668 wrote to memory of 4740 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe RuntimeBroker.exe PID 668 wrote to memory of 3756 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe backgroundTaskHost.exe PID 668 wrote to memory of 3836 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe backgroundTaskHost.exe PID 668 wrote to memory of 3632 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe explorer.exe PID 668 wrote to memory of 3632 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe explorer.exe PID 668 wrote to memory of 3632 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe explorer.exe PID 668 wrote to memory of 3604 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe XP-FEBFA1C7.EXE PID 668 wrote to memory of 3604 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe XP-FEBFA1C7.EXE PID 668 wrote to memory of 3604 668 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe XP-FEBFA1C7.EXE PID 3604 wrote to memory of 4876 3604 XP-FEBFA1C7.EXE explorer.exe PID 3604 wrote to memory of 4876 3604 XP-FEBFA1C7.EXE explorer.exe PID 3604 wrote to memory of 4876 3604 XP-FEBFA1C7.EXE explorer.exe PID 3604 wrote to memory of 4768 3604 XP-FEBFA1C7.EXE WaaSMedicAgent.exe PID 3604 wrote to memory of 4768 3604 XP-FEBFA1C7.EXE WaaSMedicAgent.exe PID 3604 wrote to memory of 4768 3604 XP-FEBFA1C7.EXE WaaSMedicAgent.exe PID 4768 wrote to memory of 4696 4768 XP-FEBFA1C7.EXE explorer.exe PID 4768 wrote to memory of 4696 4768 XP-FEBFA1C7.EXE explorer.exe PID 4768 wrote to memory of 4696 4768 XP-FEBFA1C7.EXE explorer.exe PID 4768 wrote to memory of 372 4768 XP-FEBFA1C7.EXE XP-FEBFA1C7.EXE PID 4768 wrote to memory of 372 4768 XP-FEBFA1C7.EXE XP-FEBFA1C7.EXE PID 4768 wrote to memory of 372 4768 XP-FEBFA1C7.EXE XP-FEBFA1C7.EXE PID 372 wrote to memory of 4140 372 XP-FEBFA1C7.EXE explorer.exe PID 372 wrote to memory of 4140 372 XP-FEBFA1C7.EXE explorer.exe PID 372 wrote to memory of 4140 372 XP-FEBFA1C7.EXE explorer.exe PID 372 wrote to memory of 3644 372 XP-FEBFA1C7.EXE XP-FEBFA1C7.EXE PID 372 wrote to memory of 3644 372 XP-FEBFA1C7.EXE XP-FEBFA1C7.EXE PID 372 wrote to memory of 3644 372 XP-FEBFA1C7.EXE XP-FEBFA1C7.EXE PID 3644 wrote to memory of 772 3644 XP-FEBFA1C7.EXE fontdrvhost.exe PID 3644 wrote to memory of 776 3644 XP-FEBFA1C7.EXE fontdrvhost.exe PID 3644 wrote to memory of 380 3644 XP-FEBFA1C7.EXE dwm.exe PID 3644 wrote to memory of 2688 3644 XP-FEBFA1C7.EXE sihost.exe PID 3644 wrote to memory of 2804 3644 XP-FEBFA1C7.EXE svchost.exe PID 3644 wrote to memory of 3036 3644 XP-FEBFA1C7.EXE taskhostw.exe PID 3644 wrote to memory of 3552 3644 XP-FEBFA1C7.EXE Explorer.EXE PID 3644 wrote to memory of 3672 3644 XP-FEBFA1C7.EXE svchost.exe PID 3644 wrote to memory of 3860 3644 XP-FEBFA1C7.EXE DllHost.exe PID 3644 wrote to memory of 4044 3644 XP-FEBFA1C7.EXE StartMenuExperienceHost.exe PID 3644 wrote to memory of 1060 3644 XP-FEBFA1C7.EXE RuntimeBroker.exe PID 3644 wrote to memory of 2884 3644 XP-FEBFA1C7.EXE SearchApp.exe PID 3644 wrote to memory of 3780 3644 XP-FEBFA1C7.EXE RuntimeBroker.exe PID 3644 wrote to memory of 468 3644 XP-FEBFA1C7.EXE TextInputHost.exe PID 3644 wrote to memory of 4740 3644 XP-FEBFA1C7.EXE RuntimeBroker.exe PID 3644 wrote to memory of 3756 3644 XP-FEBFA1C7.EXE backgroundTaskHost.exe PID 3644 wrote to memory of 3836 3644 XP-FEBFA1C7.EXE backgroundTaskHost.exe PID 3644 wrote to memory of 3176 3644 XP-FEBFA1C7.EXE explorer.exe PID 3644 wrote to memory of 4168 3644 XP-FEBFA1C7.EXE explorer.exe PID 3644 wrote to memory of 3420 3644 XP-FEBFA1C7.EXE BackgroundTransferHost.exe PID 3644 wrote to memory of 372 3644 XP-FEBFA1C7.EXE XP-FEBFA1C7.EXE PID 3644 wrote to memory of 372 3644 XP-FEBFA1C7.EXE XP-FEBFA1C7.EXE PID 3644 wrote to memory of 3372 3644 XP-FEBFA1C7.EXE explorer.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exeXP-FEBFA1C7.EXEdescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" XP-FEBFA1C7.EXE
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:772
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:380
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2804
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3036
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:668 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\4c7adf51d74764fc83d628e9a8cc9c60_NeikiAnalytics3⤵PID:3632
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C74⤵PID:4876
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C75⤵PID:4696
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C76⤵PID:4140
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE6⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3644 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C77⤵PID:3984
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:1052 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C78⤵PID:4220
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4184 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C79⤵PID:3784
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE9⤵PID:3120
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C710⤵PID:3688
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE10⤵PID:3320
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C711⤵PID:1772
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE11⤵PID:4016
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C712⤵PID:4876
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE12⤵PID:2160
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C713⤵PID:3208
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE13⤵PID:2284
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C714⤵PID:3652
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE14⤵PID:2448
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C715⤵PID:3688
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE15⤵PID:4800
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C716⤵PID:4424
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE16⤵PID:4664
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C717⤵PID:5124
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE17⤵PID:5204
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C718⤵PID:5300
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE18⤵PID:5344
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C719⤵PID:5448
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE19⤵PID:5496
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C720⤵PID:5612
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE20⤵PID:5732
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C721⤵PID:6112
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE21⤵PID:4252
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C722⤵PID:5532
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE22⤵PID:5696
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C723⤵PID:2204
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE23⤵PID:5468
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C724⤵PID:5840
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE24⤵PID:5056
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C725⤵PID:1368
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE25⤵PID:5392
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C726⤵PID:5828
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE26⤵PID:5496
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C727⤵PID:5256
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE27⤵PID:4944
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C728⤵PID:6092
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE28⤵PID:2448
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C729⤵PID:2828
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE29⤵PID:5516
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C730⤵PID:5988
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE30⤵PID:5788
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C731⤵PID:4676
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE31⤵PID:5492
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C732⤵PID:5688
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE32⤵PID:4360
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C733⤵PID:6236
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE33⤵PID:6360
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C734⤵PID:6588
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE34⤵PID:6728
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C735⤵PID:6952
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE35⤵PID:7032
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C736⤵PID:7148
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE36⤵PID:396
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C737⤵PID:6296
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE37⤵PID:6408
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C738⤵PID:6288
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE38⤵PID:6972
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C739⤵PID:6956
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE39⤵PID:5740
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C740⤵PID:6548
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE40⤵PID:6632
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C741⤵PID:3080
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE41⤵PID:6684
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C742⤵PID:6652
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE42⤵PID:6552
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C743⤵PID:6076
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE43⤵PID:6408
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C744⤵PID:5856
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE44⤵PID:5744
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C745⤵PID:6280
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE45⤵PID:4944
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C746⤵PID:4492
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE46⤵PID:6708
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C747⤵PID:3236
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE47⤵PID:1728
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C748⤵PID:5636
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE48⤵PID:5672
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C749⤵PID:6636
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE49⤵PID:7272
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C750⤵PID:7464
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE50⤵PID:7584
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C751⤵PID:7704
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE51⤵PID:7744
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C752⤵PID:7856
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE52⤵PID:7932
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C753⤵PID:8024
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE53⤵PID:8064
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C754⤵PID:6160
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE54⤵PID:7232
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C755⤵PID:6488
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE55⤵PID:7736
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C756⤵PID:7988
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE56⤵PID:7340
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C757⤵PID:8176
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE57⤵PID:2900
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C758⤵PID:7260
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE58⤵PID:8096
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C759⤵PID:7176
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE59⤵PID:7344
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C760⤵PID:8024
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE60⤵PID:8016
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C761⤵PID:7248
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE61⤵PID:7508
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C762⤵PID:7172
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE62⤵PID:3092
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C763⤵PID:8160
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE63⤵PID:7804
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C764⤵PID:1740
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE64⤵PID:5560
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C765⤵PID:8160
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE65⤵PID:7320
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C766⤵PID:1032
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE66⤵PID:2320
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C767⤵PID:6304
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE67⤵PID:7276
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C768⤵PID:8248
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE68⤵PID:8292
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C769⤵PID:8504
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE69⤵PID:8544
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C770⤵PID:8832
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE70⤵PID:8896
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C771⤵PID:9000
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE71⤵PID:9072
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C772⤵PID:9188
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE72⤵PID:8232
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C773⤵PID:7308
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE73⤵PID:4492
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C774⤵PID:7672
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE74⤵PID:6676
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C775⤵PID:9140
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE75⤵PID:6028
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C776⤵PID:8760
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE76⤵PID:3144
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C777⤵PID:8444
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE77⤵PID:8788
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C778⤵PID:8208
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE78⤵PID:9060
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C779⤵PID:8716
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE79⤵PID:8408
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C780⤵PID:4524
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE80⤵PID:1436
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C781⤵PID:3944
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE81⤵PID:9004
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C782⤵PID:8868
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE82⤵PID:1724
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C783⤵PID:5100
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE83⤵PID:6488
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C784⤵PID:4348
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE84⤵PID:8212
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C785⤵PID:8736
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE85⤵PID:4368
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C786⤵PID:8908
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE86⤵PID:8400
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C787⤵PID:944
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE87⤵PID:7280
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C788⤵PID:9316
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE88⤵PID:9376
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C789⤵PID:9544
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE89⤵PID:9580
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C790⤵PID:9944
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE90⤵PID:9992
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C791⤵PID:10092
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE91⤵PID:10164
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C792⤵PID:1184
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE92⤵PID:6676
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C793⤵PID:9492
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE93⤵PID:3516
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C794⤵PID:9956
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE94⤵PID:10228
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C795⤵PID:880
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE95⤵PID:1456
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C796⤵PID:9768
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE96⤵PID:9880
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C797⤵PID:9652
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE97⤵PID:9244
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C798⤵PID:9608
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE98⤵PID:8708
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C799⤵PID:8264
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE99⤵PID:9928
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7100⤵PID:9808
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE100⤵PID:10228
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7101⤵PID:9920
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE101⤵PID:1136
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7102⤵PID:9428
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE102⤵PID:3408
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7103⤵PID:9408
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE103⤵PID:9744
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7104⤵PID:7280
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE104⤵PID:9876
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7105⤵PID:9992
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE105⤵PID:5796
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7106⤵PID:1432
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE106⤵PID:1048
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7107⤵PID:9992
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE107⤵PID:8424
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7108⤵PID:10300
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE108⤵PID:10420
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7109⤵PID:10740
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE109⤵PID:10820
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7110⤵PID:10932
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE110⤵PID:10968
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7111⤵PID:11168
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE111⤵PID:1432
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7112⤵PID:10480
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE112⤵PID:9420
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7113⤵PID:10812
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE113⤵PID:10960
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7114⤵PID:10964
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE114⤵PID:10456
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7115⤵PID:6932
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE115⤵PID:1828
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7116⤵PID:10972
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE116⤵PID:924
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7117⤵PID:10196
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE117⤵PID:10464
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7118⤵PID:8956
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE118⤵PID:7048
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7119⤵PID:10752
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE119⤵PID:2132
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7120⤵PID:10600
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE120⤵PID:10484
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7121⤵PID:10540
-
-
C:\Windows\SysWOW64\XP-FEBFA1C7.EXEC:\Windows\system32\XP-FEBFA1C7.EXE121⤵PID:10196
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-FEBFA1C7122⤵PID:1644
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-