Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 03:50
Static task
static1
Behavioral task
behavioral1
Sample
e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe
-
Size
211KB
-
MD5
e001ecbe13347dc35e2de3089f6144f0
-
SHA1
ff99a479cee1d76005f9e9af1011818897b31a78
-
SHA256
eb30e6e1159ac49a11426997c6354c2b73be0d177b56f523cfb1e8c93fc1c342
-
SHA512
7720b9dd66fc7600924a59cf5b9444f87baadf864f1c832061dc9422ca6e3ff10428f2acda904e367a23dedb0210d751311f02c319790e95694baa11c7d351f7
-
SSDEEP
3072:JTDETepBR25NaWUtdBuqE4grFYszWU6Uvn65ZkmxLZklBIZH:JRU5NaWUb8qE4yF9JPy5qmbklOZH
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
kCgQsUwA.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\International\Geo\Nation kCgQsUwA.exe -
Executes dropped EXE 2 IoCs
Processes:
kCgQsUwA.exeEmIIAAgk.exepid process 2356 kCgQsUwA.exe 2264 EmIIAAgk.exe -
Loads dropped DLL 20 IoCs
Processes:
e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exekCgQsUwA.exepid process 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
kCgQsUwA.exeEmIIAAgk.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\kCgQsUwA.exe = "C:\\Users\\Admin\\kewMAAQs\\kCgQsUwA.exe" kCgQsUwA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EmIIAAgk.exe = "C:\\ProgramData\\IYUQAAMs\\EmIIAAgk.exe" EmIIAAgk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiUAkssw.exe = "C:\\Users\\Admin\\SSsAUQIk\\jiUAkssw.exe" e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kkkIogQU.exe = "C:\\ProgramData\\ViAssEMI\\kkkIogQU.exe" e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\kCgQsUwA.exe = "C:\\Users\\Admin\\kewMAAQs\\kCgQsUwA.exe" e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EmIIAAgk.exe = "C:\\ProgramData\\IYUQAAMs\\EmIIAAgk.exe" e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process 1608 2568 WerFault.exe 2436 2876 WerFault.exe jiUAkssw.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1556 reg.exe 2624 reg.exe 2260 reg.exe 2432 reg.exe 968 reg.exe 2360 reg.exe 2440 reg.exe 1968 reg.exe 1604 reg.exe 2468 reg.exe 2576 reg.exe 2652 reg.exe 1748 reg.exe 276 reg.exe 1640 reg.exe 1248 reg.exe 2472 reg.exe 2352 reg.exe 2884 reg.exe 2592 reg.exe 2292 reg.exe 2984 reg.exe 1248 reg.exe 2200 reg.exe 2076 reg.exe 1592 reg.exe 2256 reg.exe 2960 reg.exe 2408 reg.exe 1756 reg.exe 2828 reg.exe 3032 reg.exe 1292 reg.exe 1252 reg.exe 2472 reg.exe 2824 reg.exe 2852 reg.exe 868 reg.exe 1144 reg.exe 2132 reg.exe 2408 reg.exe 1824 reg.exe 1624 reg.exe 2280 reg.exe 2100 reg.exe 2076 reg.exe 672 reg.exe 2256 reg.exe 1252 reg.exe 336 reg.exe 2544 reg.exe 2808 reg.exe 2136 reg.exe 1744 reg.exe 2780 reg.exe 1084 reg.exe 2712 reg.exe 2096 reg.exe 1536 reg.exe 1596 reg.exe 2452 reg.exe 940 reg.exe 1452 reg.exe 1888 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exepid process 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 3012 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 3012 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2968 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2968 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1444 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1444 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 824 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 824 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2956 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2956 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1248 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1248 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2496 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2496 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 544 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 544 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1836 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1836 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2640 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2640 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2004 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2004 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2772 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2772 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1988 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1988 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1684 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1684 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 944 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 944 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 3000 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 3000 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2528 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2528 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2676 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2676 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2260 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2260 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2224 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2224 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1492 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1492 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2700 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2700 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2648 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2648 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2528 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2528 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 612 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 612 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1664 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1664 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2240 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2240 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2168 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 2168 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1380 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1380 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1192 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe 1192 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
kCgQsUwA.exepid process 2356 kCgQsUwA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
kCgQsUwA.exepid process 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe 2356 kCgQsUwA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.execmd.execmd.exee001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.execmd.execmd.exedescription pid process target process PID 756 wrote to memory of 2356 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe kCgQsUwA.exe PID 756 wrote to memory of 2356 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe kCgQsUwA.exe PID 756 wrote to memory of 2356 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe kCgQsUwA.exe PID 756 wrote to memory of 2356 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe kCgQsUwA.exe PID 756 wrote to memory of 2264 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe EmIIAAgk.exe PID 756 wrote to memory of 2264 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe EmIIAAgk.exe PID 756 wrote to memory of 2264 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe EmIIAAgk.exe PID 756 wrote to memory of 2264 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe EmIIAAgk.exe PID 756 wrote to memory of 2664 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 756 wrote to memory of 2664 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 756 wrote to memory of 2664 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 756 wrote to memory of 2664 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 2664 wrote to memory of 2600 2664 cmd.exe e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe PID 2664 wrote to memory of 2600 2664 cmd.exe e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe PID 2664 wrote to memory of 2600 2664 cmd.exe e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe PID 2664 wrote to memory of 2600 2664 cmd.exe e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe PID 756 wrote to memory of 2576 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 756 wrote to memory of 2576 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 756 wrote to memory of 2576 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 756 wrote to memory of 2576 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 756 wrote to memory of 2472 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 756 wrote to memory of 2472 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 756 wrote to memory of 2472 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 756 wrote to memory of 2472 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 756 wrote to memory of 2700 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 756 wrote to memory of 2700 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 756 wrote to memory of 2700 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 756 wrote to memory of 2700 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 756 wrote to memory of 2724 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 756 wrote to memory of 2724 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 756 wrote to memory of 2724 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 756 wrote to memory of 2724 756 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 2724 wrote to memory of 2984 2724 cmd.exe cscript.exe PID 2724 wrote to memory of 2984 2724 cmd.exe cscript.exe PID 2724 wrote to memory of 2984 2724 cmd.exe cscript.exe PID 2724 wrote to memory of 2984 2724 cmd.exe cscript.exe PID 2600 wrote to memory of 2964 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 2600 wrote to memory of 2964 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 2600 wrote to memory of 2964 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 2600 wrote to memory of 2964 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 2964 wrote to memory of 3012 2964 cmd.exe e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe PID 2964 wrote to memory of 3012 2964 cmd.exe e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe PID 2964 wrote to memory of 3012 2964 cmd.exe e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe PID 2964 wrote to memory of 3012 2964 cmd.exe e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe PID 2600 wrote to memory of 2096 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 2600 wrote to memory of 2096 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 2600 wrote to memory of 2096 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 2600 wrote to memory of 2096 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 2600 wrote to memory of 2016 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 2600 wrote to memory of 2016 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 2600 wrote to memory of 2016 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 2600 wrote to memory of 2016 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 2600 wrote to memory of 1968 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 2600 wrote to memory of 1968 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 2600 wrote to memory of 1968 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 2600 wrote to memory of 1968 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe reg.exe PID 2600 wrote to memory of 2816 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 2600 wrote to memory of 2816 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 2600 wrote to memory of 2816 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 2600 wrote to memory of 2816 2600 e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe cmd.exe PID 2816 wrote to memory of 2424 2816 cmd.exe cscript.exe PID 2816 wrote to memory of 2424 2816 cmd.exe cscript.exe PID 2816 wrote to memory of 2424 2816 cmd.exe cscript.exe PID 2816 wrote to memory of 2424 2816 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\kewMAAQs\kCgQsUwA.exe"C:\Users\Admin\kewMAAQs\kCgQsUwA.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2356
-
-
C:\ProgramData\IYUQAAMs\EmIIAAgk.exe"C:\ProgramData\IYUQAAMs\EmIIAAgk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2264
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"2⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"4⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"6⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"8⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"10⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics11⤵
- Suspicious behavior: EnumeratesProcesses
PID:824 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"12⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics13⤵
- Adds Run key to start application
PID:2300 -
C:\Users\Admin\SSsAUQIk\jiUAkssw.exe"C:\Users\Admin\SSsAUQIk\jiUAkssw.exe"14⤵PID:2876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 3615⤵
- Program crash
PID:2436
-
-
-
C:\ProgramData\ViAssEMI\kkkIogQU.exe"C:\ProgramData\ViAssEMI\kkkIogQU.exe"14⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 3615⤵
- Program crash
PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"14⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"16⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"18⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"20⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics21⤵
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"22⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"24⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"26⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"28⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"30⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"32⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"34⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics35⤵
- Suspicious behavior: EnumeratesProcesses
PID:944 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"36⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics37⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"38⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"40⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"42⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"44⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"46⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"48⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"50⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"52⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"54⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics55⤵
- Suspicious behavior: EnumeratesProcesses
PID:612 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"56⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"58⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"60⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"62⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"64⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics65⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"66⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics67⤵PID:2200
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"68⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics69⤵PID:2036
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"70⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics71⤵PID:2996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"72⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics73⤵PID:2556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"74⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics75⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"76⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics77⤵PID:2968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"78⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics79⤵PID:488
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"80⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics81⤵PID:2164
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"82⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics83⤵PID:1716
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"84⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics85⤵PID:1556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"86⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics87⤵PID:3032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"88⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics89⤵PID:1816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"90⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics91⤵PID:2192
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"92⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics93⤵PID:1808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"94⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics95⤵PID:756
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"96⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics97⤵PID:2652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"98⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics99⤵PID:2172
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"100⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics101⤵PID:1656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"102⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics103⤵PID:2544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"104⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics105⤵PID:2076
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"106⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics107⤵PID:412
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"108⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics109⤵PID:2160
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"110⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics111⤵PID:2896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"112⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics113⤵PID:828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"114⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics115⤵PID:1648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"116⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics117⤵PID:672
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"118⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics119⤵PID:2548
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"120⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics121⤵PID:2148
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics"122⤵PID:2212
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-