Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe
-
Size
194KB
-
MD5
c8d136dedf82a0d5a1457276390f2fd0
-
SHA1
18fde16cafcde2ad9c94077b1b96b84444f9347a
-
SHA256
27b5f2426d36bd9ea8954db23d3252d84262d7fc383daf2ca166a25fea290da9
-
SHA512
5f6be37d84441424a8ff800b6c4250f5583d45b95387f1ab274c55c3869ecebcb5683304cfa6eb657b0be23a96bdddcba88451d13ecc4b4f5a5f15c4876502e2
-
SSDEEP
6144:gGatRGlokdIH982PoucNI1LtdKFJCnPXFVR0QrGC9hH8X4XXXG9D4D9SDHpbqHin:IROS98b1uw
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (65) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\International\Geo\Nation MmkEAQQM.exe -
Executes dropped EXE 2 IoCs
pid Process 2832 MmkEAQQM.exe 1856 xIcAgYgs.exe -
Loads dropped DLL 20 IoCs
pid Process 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\MmkEAQQM.exe = "C:\\Users\\Admin\\YYYQAggY\\MmkEAQQM.exe" c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xIcAgYgs.exe = "C:\\ProgramData\\uSEIMcYg\\xIcAgYgs.exe" c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\MmkEAQQM.exe = "C:\\Users\\Admin\\YYYQAggY\\MmkEAQQM.exe" MmkEAQQM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xIcAgYgs.exe = "C:\\ProgramData\\uSEIMcYg\\xIcAgYgs.exe" xIcAgYgs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1036 reg.exe 572 reg.exe 3004 reg.exe 2596 reg.exe 1720 reg.exe 936 reg.exe 1128 reg.exe 2672 reg.exe 2076 reg.exe 2844 reg.exe 2064 reg.exe 2932 reg.exe 2808 reg.exe 1432 reg.exe 284 reg.exe 1812 reg.exe 3036 reg.exe 2624 reg.exe 2768 reg.exe 2324 reg.exe 2848 reg.exe 1632 reg.exe 644 reg.exe 1684 reg.exe 2388 reg.exe 484 reg.exe 3024 reg.exe 1696 reg.exe 1296 reg.exe 1252 reg.exe 1724 reg.exe 2628 reg.exe 1704 reg.exe 2548 reg.exe 1808 reg.exe 2672 reg.exe 2552 reg.exe 1532 reg.exe 2572 reg.exe 888 reg.exe 1580 reg.exe 1560 reg.exe 1700 reg.exe 1632 reg.exe 2776 reg.exe 2588 reg.exe 2716 Process not Found 2328 reg.exe 2776 reg.exe 2116 reg.exe 2668 reg.exe 1580 reg.exe 2084 reg.exe 3012 reg.exe 2720 reg.exe 2264 reg.exe 1748 reg.exe 680 reg.exe 620 reg.exe 1504 reg.exe 484 reg.exe 900 reg.exe 2120 reg.exe 2444 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2484 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2484 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 304 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 304 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2052 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2052 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1704 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1704 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2296 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2296 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2604 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2604 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2692 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2692 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2892 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2892 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1292 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1292 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2052 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2052 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1716 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1716 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2528 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2528 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1824 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1824 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1220 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1220 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 636 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 636 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2124 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2124 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1724 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1724 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2440 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2440 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1532 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1532 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2160 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2160 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 768 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 768 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1560 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1560 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2592 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2592 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1716 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1716 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2792 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2792 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2192 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2192 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 696 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 696 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1472 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 1472 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2044 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2044 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2444 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 2444 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2832 MmkEAQQM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe 2832 MmkEAQQM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2832 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 28 PID 3024 wrote to memory of 2832 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 28 PID 3024 wrote to memory of 2832 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 28 PID 3024 wrote to memory of 2832 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 28 PID 3024 wrote to memory of 1856 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 29 PID 3024 wrote to memory of 1856 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 29 PID 3024 wrote to memory of 1856 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 29 PID 3024 wrote to memory of 1856 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 29 PID 3024 wrote to memory of 2656 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 30 PID 3024 wrote to memory of 2656 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 30 PID 3024 wrote to memory of 2656 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 30 PID 3024 wrote to memory of 2656 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 30 PID 2656 wrote to memory of 2688 2656 cmd.exe 32 PID 2656 wrote to memory of 2688 2656 cmd.exe 32 PID 2656 wrote to memory of 2688 2656 cmd.exe 32 PID 2656 wrote to memory of 2688 2656 cmd.exe 32 PID 3024 wrote to memory of 1152 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 33 PID 3024 wrote to memory of 1152 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 33 PID 3024 wrote to memory of 1152 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 33 PID 3024 wrote to memory of 1152 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 33 PID 3024 wrote to memory of 2564 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 34 PID 3024 wrote to memory of 2564 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 34 PID 3024 wrote to memory of 2564 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 34 PID 3024 wrote to memory of 2564 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 34 PID 3024 wrote to memory of 2784 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 37 PID 3024 wrote to memory of 2784 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 37 PID 3024 wrote to memory of 2784 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 37 PID 3024 wrote to memory of 2784 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 37 PID 3024 wrote to memory of 2744 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 39 PID 3024 wrote to memory of 2744 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 39 PID 3024 wrote to memory of 2744 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 39 PID 3024 wrote to memory of 2744 3024 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 39 PID 2744 wrote to memory of 2672 2744 cmd.exe 41 PID 2744 wrote to memory of 2672 2744 cmd.exe 41 PID 2744 wrote to memory of 2672 2744 cmd.exe 41 PID 2744 wrote to memory of 2672 2744 cmd.exe 41 PID 2688 wrote to memory of 2560 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 42 PID 2688 wrote to memory of 2560 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 42 PID 2688 wrote to memory of 2560 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 42 PID 2688 wrote to memory of 2560 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 42 PID 2560 wrote to memory of 2484 2560 cmd.exe 44 PID 2560 wrote to memory of 2484 2560 cmd.exe 44 PID 2560 wrote to memory of 2484 2560 cmd.exe 44 PID 2560 wrote to memory of 2484 2560 cmd.exe 44 PID 2688 wrote to memory of 1528 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 45 PID 2688 wrote to memory of 1528 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 45 PID 2688 wrote to memory of 1528 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 45 PID 2688 wrote to memory of 1528 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 45 PID 2688 wrote to memory of 2768 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 46 PID 2688 wrote to memory of 2768 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 46 PID 2688 wrote to memory of 2768 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 46 PID 2688 wrote to memory of 2768 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 46 PID 2688 wrote to memory of 2628 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 48 PID 2688 wrote to memory of 2628 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 48 PID 2688 wrote to memory of 2628 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 48 PID 2688 wrote to memory of 2628 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 48 PID 2688 wrote to memory of 1884 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 49 PID 2688 wrote to memory of 1884 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 49 PID 2688 wrote to memory of 1884 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 49 PID 2688 wrote to memory of 1884 2688 c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe 49 PID 1884 wrote to memory of 1940 1884 cmd.exe 53 PID 1884 wrote to memory of 1940 1884 cmd.exe 53 PID 1884 wrote to memory of 1940 1884 cmd.exe 53 PID 1884 wrote to memory of 1940 1884 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\YYYQAggY\MmkEAQQM.exe"C:\Users\Admin\YYYQAggY\MmkEAQQM.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2832
-
-
C:\ProgramData\uSEIMcYg\xIcAgYgs.exe"C:\ProgramData\uSEIMcYg\xIcAgYgs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1856
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"2⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"4⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"6⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics7⤵
- Suspicious behavior: EnumeratesProcesses
PID:304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"8⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"10⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"12⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"14⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"16⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"18⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"20⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"22⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"24⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"26⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"28⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"30⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"32⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics33⤵
- Suspicious behavior: EnumeratesProcesses
PID:636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"34⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"36⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"38⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"40⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"42⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"44⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics45⤵
- Suspicious behavior: EnumeratesProcesses
PID:768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"46⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"48⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"50⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"52⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"54⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"56⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics57⤵
- Suspicious behavior: EnumeratesProcesses
PID:696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"58⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"60⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"62⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"64⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics65⤵PID:2728
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"66⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics67⤵PID:2660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"68⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics69⤵PID:1524
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"70⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics71⤵PID:692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"72⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics73⤵PID:1292
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"74⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics75⤵PID:2068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"76⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics77⤵PID:2564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"78⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics79⤵PID:1040
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"80⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics81⤵PID:2272
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"82⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics83⤵PID:1344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"84⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics85⤵PID:1584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"86⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics87⤵PID:2548
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"88⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics89⤵PID:2616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"90⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics91⤵PID:1428
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"92⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics93⤵PID:2972
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"94⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics95⤵PID:3036
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"96⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics97⤵PID:1048
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"98⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics99⤵PID:1304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"100⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics101⤵PID:1796
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"102⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics103⤵PID:2612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"104⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics105⤵PID:1500
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"106⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics107⤵PID:1944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"108⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics109⤵PID:1812
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"110⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics111⤵PID:1636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"112⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics113⤵PID:548
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"114⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics115⤵PID:1872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"116⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics117⤵PID:1696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"118⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics119⤵PID:2136
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"120⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics121⤵PID:2556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d136dedf82a0d5a1457276390f2fd0_NeikiAnalytics"122⤵PID:2484
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-