Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 17:20
Static task
static1
Behavioral task
behavioral1
Sample
028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe
-
Size
117KB
-
MD5
028117b838a41c18f5529716ae335a10
-
SHA1
ed5df695a34c986b2de96ab0f7ddf889e03cf893
-
SHA256
5775e7746e84ed615772781c87a444f5bcbcf98c11d2a57be97e75635b0551a3
-
SHA512
efba89be9f7d7d9c8cfab1241134e3d8c8381325174bbe7129a82edeaa3598ea6595cfb340c21c16a409e431c57c7c7e326a3a00bf1469e41351c8f3a39f16ae
-
SSDEEP
3072:9SSUjdCriWBPlvDvUEY3u9cFzPLcvCnAOZS7i:KCriQlwEZcFzovCnTS7i
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 63 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Control Panel\International\Geo\Nation ccsYgYkY.exe -
Executes dropped EXE 2 IoCs
pid Process 2000 DOoUAgQo.exe 2464 ccsYgYkY.exe -
Loads dropped DLL 20 IoCs
pid Process 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\DOoUAgQo.exe = "C:\\Users\\Admin\\WAQcQMsA\\DOoUAgQo.exe" DOoUAgQo.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\DOoUAgQo.exe = "C:\\Users\\Admin\\WAQcQMsA\\DOoUAgQo.exe" 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ccsYgYkY.exe = "C:\\ProgramData\\dWAEIUAo\\ccsYgYkY.exe" 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ccsYgYkY.exe = "C:\\ProgramData\\dWAEIUAo\\ccsYgYkY.exe" ccsYgYkY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 832 reg.exe 1300 reg.exe 2960 reg.exe 2092 reg.exe 2448 reg.exe 1372 reg.exe 3000 reg.exe 2620 reg.exe 1476 reg.exe 836 reg.exe 2448 reg.exe 3060 reg.exe 948 reg.exe 1716 reg.exe 816 reg.exe 2788 reg.exe 1632 reg.exe 688 reg.exe 1672 reg.exe 2968 reg.exe 656 reg.exe 1724 reg.exe 2604 reg.exe 2228 reg.exe 3024 reg.exe 2872 reg.exe 1944 reg.exe 2632 reg.exe 1856 reg.exe 2792 reg.exe 956 reg.exe 1376 reg.exe 464 reg.exe 896 reg.exe 2860 reg.exe 2724 reg.exe 300 reg.exe 2592 reg.exe 2840 reg.exe 832 reg.exe 1720 reg.exe 2088 reg.exe 2272 reg.exe 2400 reg.exe 2760 reg.exe 1372 reg.exe 2040 reg.exe 1604 reg.exe 2784 reg.exe 1936 reg.exe 2656 reg.exe 2448 reg.exe 744 reg.exe 2864 reg.exe 1944 reg.exe 1320 reg.exe 2004 reg.exe 1400 reg.exe 1632 reg.exe 1976 reg.exe 1588 reg.exe 2740 reg.exe 2372 reg.exe 2136 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 3004 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 3004 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2768 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2768 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2064 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2064 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 3068 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 3068 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1708 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1708 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2752 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2752 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2980 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2980 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2248 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2248 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2552 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2552 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1528 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1528 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2916 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2916 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2500 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2500 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2732 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2732 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2688 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2688 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2008 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2008 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1028 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1028 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1752 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1752 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2700 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2700 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2104 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2104 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 792 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 792 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2976 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2976 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2908 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2908 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2732 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2732 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2764 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2764 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2668 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2668 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2724 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 2724 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1992 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1992 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1644 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1644 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 608 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 608 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1188 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 1188 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2464 ccsYgYkY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe 2464 ccsYgYkY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2000 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 28 PID 1716 wrote to memory of 2000 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 28 PID 1716 wrote to memory of 2000 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 28 PID 1716 wrote to memory of 2000 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 28 PID 1716 wrote to memory of 2464 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 29 PID 1716 wrote to memory of 2464 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 29 PID 1716 wrote to memory of 2464 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 29 PID 1716 wrote to memory of 2464 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 29 PID 1716 wrote to memory of 2648 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 30 PID 1716 wrote to memory of 2648 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 30 PID 1716 wrote to memory of 2648 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 30 PID 1716 wrote to memory of 2648 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 30 PID 2648 wrote to memory of 2692 2648 cmd.exe 32 PID 2648 wrote to memory of 2692 2648 cmd.exe 32 PID 2648 wrote to memory of 2692 2648 cmd.exe 32 PID 2648 wrote to memory of 2692 2648 cmd.exe 32 PID 1716 wrote to memory of 2896 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 33 PID 1716 wrote to memory of 2896 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 33 PID 1716 wrote to memory of 2896 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 33 PID 1716 wrote to memory of 2896 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 33 PID 1716 wrote to memory of 2740 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 34 PID 1716 wrote to memory of 2740 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 34 PID 1716 wrote to memory of 2740 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 34 PID 1716 wrote to memory of 2740 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 34 PID 1716 wrote to memory of 2264 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 36 PID 1716 wrote to memory of 2264 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 36 PID 1716 wrote to memory of 2264 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 36 PID 1716 wrote to memory of 2264 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 36 PID 1716 wrote to memory of 2580 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 39 PID 1716 wrote to memory of 2580 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 39 PID 1716 wrote to memory of 2580 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 39 PID 1716 wrote to memory of 2580 1716 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 39 PID 2580 wrote to memory of 2664 2580 cmd.exe 41 PID 2580 wrote to memory of 2664 2580 cmd.exe 41 PID 2580 wrote to memory of 2664 2580 cmd.exe 41 PID 2580 wrote to memory of 2664 2580 cmd.exe 41 PID 2692 wrote to memory of 2344 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 42 PID 2692 wrote to memory of 2344 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 42 PID 2692 wrote to memory of 2344 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 42 PID 2692 wrote to memory of 2344 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 42 PID 2344 wrote to memory of 3004 2344 cmd.exe 44 PID 2344 wrote to memory of 3004 2344 cmd.exe 44 PID 2344 wrote to memory of 3004 2344 cmd.exe 44 PID 2344 wrote to memory of 3004 2344 cmd.exe 44 PID 2692 wrote to memory of 2864 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 45 PID 2692 wrote to memory of 2864 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 45 PID 2692 wrote to memory of 2864 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 45 PID 2692 wrote to memory of 2864 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 45 PID 2692 wrote to memory of 2792 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 46 PID 2692 wrote to memory of 2792 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 46 PID 2692 wrote to memory of 2792 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 46 PID 2692 wrote to memory of 2792 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 46 PID 2692 wrote to memory of 2860 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 48 PID 2692 wrote to memory of 2860 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 48 PID 2692 wrote to memory of 2860 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 48 PID 2692 wrote to memory of 2860 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 48 PID 2692 wrote to memory of 2992 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 49 PID 2692 wrote to memory of 2992 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 49 PID 2692 wrote to memory of 2992 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 49 PID 2692 wrote to memory of 2992 2692 028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe 49 PID 2992 wrote to memory of 1948 2992 cmd.exe 53 PID 2992 wrote to memory of 1948 2992 cmd.exe 53 PID 2992 wrote to memory of 1948 2992 cmd.exe 53 PID 2992 wrote to memory of 1948 2992 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\WAQcQMsA\DOoUAgQo.exe"C:\Users\Admin\WAQcQMsA\DOoUAgQo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2000
-
-
C:\ProgramData\dWAEIUAo\ccsYgYkY.exe"C:\ProgramData\dWAEIUAo\ccsYgYkY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2464
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"2⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"4⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"6⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"8⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"10⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"12⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"14⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"16⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"18⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"20⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"22⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"24⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"26⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"28⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"30⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"32⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"34⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"36⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"38⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"40⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"42⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics43⤵
- Suspicious behavior: EnumeratesProcesses
PID:792 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"44⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"46⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"48⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"50⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"52⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"54⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"56⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"58⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"60⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics61⤵
- Suspicious behavior: EnumeratesProcesses
PID:608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"62⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1188 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"64⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics65⤵PID:2080
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"66⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics67⤵PID:2668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"68⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics69⤵PID:1688
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"70⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics71⤵PID:552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"72⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics73⤵PID:2584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"74⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics75⤵PID:1792
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"76⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics77⤵PID:344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"78⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics79⤵PID:2968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"80⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics81⤵PID:2800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"82⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics83⤵PID:2592
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"84⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics85⤵PID:2956
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"86⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics87⤵PID:1708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"88⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics89⤵PID:1904
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"90⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics91⤵PID:1976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"92⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics93⤵PID:1848
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"94⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics95⤵PID:2876
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"96⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics97⤵PID:2236
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"98⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics99⤵PID:2988
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"100⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics101⤵PID:1372
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"102⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics103⤵PID:2212
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"104⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics105⤵PID:1176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"106⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics107⤵PID:568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"108⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics109⤵PID:1728
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"110⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics111⤵PID:2436
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"112⤵PID:352
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics113⤵PID:2908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"114⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics115⤵PID:2384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"116⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics117⤵PID:2820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"118⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics119⤵PID:2228
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"120⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics121⤵PID:2068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\028117b838a41c18f5529716ae335a10_NeikiAnalytics"122⤵PID:2760
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-