Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe
-
Size
155KB
-
MD5
9100525baa0f4926aec1e7f28ea97970
-
SHA1
25f1c3f842ca345b5f7bb86e215c6899f0ed038f
-
SHA256
9db0516f836e38aabdfaebfd08c5475a17ba21eb3b43c4d6d209ab4c143f5726
-
SHA512
7912045b5672db6dafaa2e5c6914e0f1ba6e39667cc0c35a35cc594759827870d4a40e9acc1ae7078c8fd64a40c623da65405aca14d7fb620cf04c20a795a203
-
SSDEEP
3072:2ajn2Zo/iJl88XE043iXv9MNm0ISbfGDLon4+m+tqPq:26nqmiD8800jbmJtoq
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found -
Executes dropped EXE 3 IoCs
pid Process 1296 IkEIsQoY.exe 3892 QQoAUEog.exe 1624 IkEIsQoY.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IkEIsQoY.exe = "C:\\Users\\Admin\\QUMQkMos\\IkEIsQoY.exe" 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QQoAUEog.exe = "C:\\ProgramData\\hsEcEAwI\\QQoAUEog.exe" 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IkEIsQoY.exe = "C:\\Users\\Admin\\QUMQkMos\\IkEIsQoY.exe" IkEIsQoY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QQoAUEog.exe = "C:\\ProgramData\\hsEcEAwI\\QQoAUEog.exe" QQoAUEog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IkEIsQoY.exe = "C:\\Users\\Admin\\QUMQkMos\\IkEIsQoY.exe" 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IkEIsQoY.exe = "C:\\Users\\Admin\\QUMQkMos\\IkEIsQoY.exe" IkEIsQoY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2732 1296 WerFault.exe 85 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2676 Process not Found 1480 Process not Found 1956 reg.exe 4352 Process not Found 212 Process not Found 4256 reg.exe 2732 Process not Found 4772 Process not Found 3212 Process not Found 4612 reg.exe 4676 Process not Found 3692 Process not Found 2188 Process not Found 4780 Process not Found 4968 Process not Found 3140 Process not Found 4832 Process not Found 3704 reg.exe 4008 reg.exe 208 Process not Found 3544 Process not Found 2312 Process not Found 384 Process not Found 4844 reg.exe 4424 reg.exe 3348 Process not Found 1868 Process not Found 2528 Process not Found 2044 Process not Found 408 Process not Found 3132 Process not Found 4832 reg.exe 4876 Process not Found 2660 Process not Found 3348 Process not Found 1204 Process not Found 2176 Process not Found 5092 reg.exe 4024 reg.exe 3948 Process not Found 5024 Process not Found 3448 reg.exe 3632 reg.exe 2756 Process not Found 404 Process not Found 4356 reg.exe 4064 Process not Found 3816 reg.exe 1808 reg.exe 5076 Process not Found 4848 reg.exe 2368 reg.exe 4692 Process not Found 4860 Process not Found 4056 reg.exe 4832 Process not Found 1596 Process not Found 4172 Process not Found 3696 Process not Found 3816 reg.exe 2064 reg.exe 2464 Process not Found 4268 Process not Found 3436 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 432 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 432 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 432 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 432 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4904 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4904 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4904 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4904 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4964 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4964 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4964 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4964 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 5088 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 5088 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 5088 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 5088 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 2492 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 2492 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 2492 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 2492 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3436 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3436 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3436 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3436 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3544 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3544 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3544 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3544 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4740 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4740 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4740 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 4740 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3716 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3716 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3716 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3716 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3244 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3244 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3244 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3244 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3208 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3208 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3208 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 3208 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 1820 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 1820 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 1820 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 1820 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 2168 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 2168 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 2168 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 2168 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4692 wrote to memory of 1296 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 85 PID 4692 wrote to memory of 1296 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 85 PID 4692 wrote to memory of 1296 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 85 PID 4692 wrote to memory of 3892 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 86 PID 4692 wrote to memory of 3892 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 86 PID 4692 wrote to memory of 3892 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 86 PID 4692 wrote to memory of 3704 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 87 PID 4692 wrote to memory of 3704 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 87 PID 4692 wrote to memory of 3704 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 87 PID 3704 wrote to memory of 1488 3704 cmd.exe 90 PID 3704 wrote to memory of 1488 3704 cmd.exe 90 PID 3704 wrote to memory of 1488 3704 cmd.exe 90 PID 4692 wrote to memory of 4204 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 91 PID 4692 wrote to memory of 4204 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 91 PID 4692 wrote to memory of 4204 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 91 PID 4692 wrote to memory of 812 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 92 PID 4692 wrote to memory of 812 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 92 PID 4692 wrote to memory of 812 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 92 PID 4692 wrote to memory of 5092 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 93 PID 4692 wrote to memory of 5092 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 93 PID 4692 wrote to memory of 5092 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 93 PID 4692 wrote to memory of 1960 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 94 PID 4692 wrote to memory of 1960 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 94 PID 4692 wrote to memory of 1960 4692 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 94 PID 1960 wrote to memory of 4024 1960 cmd.exe 99 PID 1960 wrote to memory of 4024 1960 cmd.exe 99 PID 1960 wrote to memory of 4024 1960 cmd.exe 99 PID 1488 wrote to memory of 3820 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 100 PID 1488 wrote to memory of 3820 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 100 PID 1488 wrote to memory of 3820 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 100 PID 3820 wrote to memory of 2864 3820 cmd.exe 102 PID 3820 wrote to memory of 2864 3820 cmd.exe 102 PID 3820 wrote to memory of 2864 3820 cmd.exe 102 PID 1488 wrote to memory of 4172 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 103 PID 1488 wrote to memory of 4172 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 103 PID 1488 wrote to memory of 4172 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 103 PID 1488 wrote to memory of 2356 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 104 PID 1488 wrote to memory of 2356 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 104 PID 1488 wrote to memory of 2356 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 104 PID 1488 wrote to memory of 3720 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 105 PID 1488 wrote to memory of 3720 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 105 PID 1488 wrote to memory of 3720 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 105 PID 1488 wrote to memory of 1204 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 106 PID 1488 wrote to memory of 1204 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 106 PID 1488 wrote to memory of 1204 1488 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 106 PID 1204 wrote to memory of 4576 1204 cmd.exe 111 PID 1204 wrote to memory of 4576 1204 cmd.exe 111 PID 1204 wrote to memory of 4576 1204 cmd.exe 111 PID 2864 wrote to memory of 3288 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 112 PID 2864 wrote to memory of 3288 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 112 PID 2864 wrote to memory of 3288 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 112 PID 3288 wrote to memory of 432 3288 cmd.exe 114 PID 3288 wrote to memory of 432 3288 cmd.exe 114 PID 3288 wrote to memory of 432 3288 cmd.exe 114 PID 2864 wrote to memory of 3192 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 115 PID 2864 wrote to memory of 3192 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 115 PID 2864 wrote to memory of 3192 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 115 PID 2864 wrote to memory of 1008 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 116 PID 2864 wrote to memory of 1008 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 116 PID 2864 wrote to memory of 1008 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 116 PID 2864 wrote to memory of 4684 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 117 PID 2864 wrote to memory of 4684 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 117 PID 2864 wrote to memory of 4684 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 117 PID 2864 wrote to memory of 4332 2864 9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\QUMQkMos\IkEIsQoY.exe"C:\Users\Admin\QUMQkMos\IkEIsQoY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 12483⤵
- Program crash
PID:2732
-
-
-
C:\ProgramData\hsEcEAwI\QQoAUEog.exe"C:\ProgramData\hsEcEAwI\QQoAUEog.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"2⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"4⤵
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"6⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics7⤵
- Suspicious behavior: EnumeratesProcesses
PID:432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"8⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"10⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"12⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics13⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"14⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"16⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"18⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"20⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"22⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"24⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"26⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"28⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"30⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"32⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics33⤵PID:4820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"34⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics35⤵PID:4196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"36⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics37⤵PID:4080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"38⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics39⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"40⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics41⤵PID:964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"42⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics43⤵PID:4864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"44⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics45⤵PID:4456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"46⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics47⤵PID:980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"48⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics49⤵PID:3300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"50⤵PID:3948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV151⤵PID:4784
-
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics51⤵PID:3008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"52⤵PID:1736
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics53⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"54⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics55⤵PID:3524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"56⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics57⤵PID:3632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"58⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics59⤵PID:4404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"60⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics61⤵PID:4576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"62⤵PID:4424
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics63⤵PID:3728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"64⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics65⤵PID:4332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"66⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics67⤵PID:4828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"68⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics69⤵PID:5048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"70⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics71⤵PID:4792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"72⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics73⤵PID:2720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"74⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics75⤵PID:4848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"76⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics77⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"78⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics79⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"80⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics81⤵PID:4700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"82⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics83⤵PID:2160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"84⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics85⤵PID:2456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"86⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics87⤵PID:4184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"88⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics89⤵PID:3572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"90⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics91⤵PID:2096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"92⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics93⤵PID:2880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"94⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics95⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"96⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics97⤵PID:1932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"98⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics99⤵PID:3536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"100⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics101⤵PID:2368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"102⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics103⤵PID:4824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"104⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics105⤵PID:3276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"106⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics107⤵PID:3544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"108⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics109⤵PID:5116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"110⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics111⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"112⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics113⤵PID:4712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"114⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics115⤵PID:4508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"116⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics117⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"118⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics119⤵PID:4172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"120⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics121⤵PID:436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics"122⤵PID:2720
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-