Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe
-
Size
853KB
-
MD5
e20ae650aea056ef18a759f7484b59c0
-
SHA1
c416948b48eb19b0acad8ce8a1b0ec5a80b228fd
-
SHA256
72c9e4a0cc512bfda7c772489039d695f51198762b96873d63080b6c46b6c2b5
-
SHA512
5683a267476643c7012e7202e3f7da38c56516f32e202e537c0d6ccad390f8f57f24abb428c3576683deba863e8687b8c8e3b76c4642a43f44aa3e3f7bc96662
-
SSDEEP
24576:rlYi1dzS/7ur9wDEBpzsBqmy2euTonYS+p1m:Gsd+zureDEBpzsBqAedt+
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\International\Geo\Nation TCwwssEI.exe -
Executes dropped EXE 2 IoCs
pid Process 2812 hMUEIUcY.exe 2620 TCwwssEI.exe -
Loads dropped DLL 20 IoCs
pid Process 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TCwwssEI.exe = "C:\\ProgramData\\mEsAQwgM\\TCwwssEI.exe" TCwwssEI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\hMUEIUcY.exe = "C:\\Users\\Admin\\nqAIwAYs\\hMUEIUcY.exe" hMUEIUcY.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\hMUEIUcY.exe = "C:\\Users\\Admin\\nqAIwAYs\\hMUEIUcY.exe" e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TCwwssEI.exe = "C:\\ProgramData\\mEsAQwgM\\TCwwssEI.exe" e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico TCwwssEI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1724 reg.exe 2176 reg.exe 2004 reg.exe 1008 reg.exe 2548 reg.exe 1976 reg.exe 1532 reg.exe 2436 reg.exe 2080 reg.exe 1392 reg.exe 2072 reg.exe 1124 reg.exe 1008 reg.exe 1840 reg.exe 1896 reg.exe 2716 reg.exe 2052 reg.exe 1832 reg.exe 2428 reg.exe 1100 reg.exe 1840 reg.exe 1224 reg.exe 1748 reg.exe 2820 reg.exe 1072 reg.exe 2232 reg.exe 2004 reg.exe 1268 reg.exe 2528 reg.exe 3020 reg.exe 1568 reg.exe 2384 reg.exe 1440 reg.exe 1940 reg.exe 1612 reg.exe 1892 reg.exe 324 reg.exe 2788 reg.exe 1704 reg.exe 1180 reg.exe 1884 reg.exe 764 reg.exe 2792 reg.exe 2672 reg.exe 1704 reg.exe 1620 reg.exe 1904 reg.exe 2768 reg.exe 2456 reg.exe 2848 reg.exe 3028 reg.exe 1688 reg.exe 1072 reg.exe 1592 reg.exe 2388 reg.exe 1284 reg.exe 696 reg.exe 1100 reg.exe 2772 reg.exe 1980 reg.exe 1952 reg.exe 2136 reg.exe 2508 reg.exe 604 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2788 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2788 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2472 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2472 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2852 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2852 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 3024 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 3024 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2860 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2860 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2524 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2524 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2460 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2460 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1512 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1512 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2680 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2680 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 3032 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 3032 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1500 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1500 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1732 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1732 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2784 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2784 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2204 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2204 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 776 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 776 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2116 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2116 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 3060 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 3060 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2920 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2920 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1740 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1740 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2480 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2480 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2736 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2736 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2396 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2396 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2616 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2616 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2484 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2484 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2592 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2592 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2928 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2928 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1616 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1616 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2784 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2784 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 3008 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 3008 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1472 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1472 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2620 TCwwssEI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe 2620 TCwwssEI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2812 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 28 PID 2964 wrote to memory of 2812 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 28 PID 2964 wrote to memory of 2812 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 28 PID 2964 wrote to memory of 2812 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 28 PID 2964 wrote to memory of 2620 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 29 PID 2964 wrote to memory of 2620 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 29 PID 2964 wrote to memory of 2620 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 29 PID 2964 wrote to memory of 2620 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 29 PID 2964 wrote to memory of 2828 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 183 PID 2964 wrote to memory of 2828 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 183 PID 2964 wrote to memory of 2828 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 183 PID 2964 wrote to memory of 2828 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 183 PID 2828 wrote to memory of 1280 2828 cmd.exe 254 PID 2828 wrote to memory of 1280 2828 cmd.exe 254 PID 2828 wrote to memory of 1280 2828 cmd.exe 254 PID 2828 wrote to memory of 1280 2828 cmd.exe 254 PID 2964 wrote to memory of 2528 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 33 PID 2964 wrote to memory of 2528 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 33 PID 2964 wrote to memory of 2528 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 33 PID 2964 wrote to memory of 2528 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 33 PID 2964 wrote to memory of 2588 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 34 PID 2964 wrote to memory of 2588 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 34 PID 2964 wrote to memory of 2588 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 34 PID 2964 wrote to memory of 2588 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 34 PID 2964 wrote to memory of 2756 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 421 PID 2964 wrote to memory of 2756 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 421 PID 2964 wrote to memory of 2756 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 421 PID 2964 wrote to memory of 2756 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 421 PID 2964 wrote to memory of 2460 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 511 PID 2964 wrote to memory of 2460 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 511 PID 2964 wrote to memory of 2460 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 511 PID 2964 wrote to memory of 2460 2964 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 511 PID 2460 wrote to memory of 2532 2460 cmd.exe 256 PID 2460 wrote to memory of 2532 2460 cmd.exe 256 PID 2460 wrote to memory of 2532 2460 cmd.exe 256 PID 2460 wrote to memory of 2532 2460 cmd.exe 256 PID 1280 wrote to memory of 2512 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 42 PID 1280 wrote to memory of 2512 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 42 PID 1280 wrote to memory of 2512 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 42 PID 1280 wrote to memory of 2512 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 42 PID 2512 wrote to memory of 2788 2512 cmd.exe 381 PID 2512 wrote to memory of 2788 2512 cmd.exe 381 PID 2512 wrote to memory of 2788 2512 cmd.exe 381 PID 2512 wrote to memory of 2788 2512 cmd.exe 381 PID 1280 wrote to memory of 2760 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 45 PID 1280 wrote to memory of 2760 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 45 PID 1280 wrote to memory of 2760 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 45 PID 1280 wrote to memory of 2760 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 45 PID 1280 wrote to memory of 2776 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 121 PID 1280 wrote to memory of 2776 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 121 PID 1280 wrote to memory of 2776 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 121 PID 1280 wrote to memory of 2776 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 121 PID 1280 wrote to memory of 2800 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 119 PID 1280 wrote to memory of 2800 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 119 PID 1280 wrote to memory of 2800 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 119 PID 1280 wrote to memory of 2800 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 119 PID 1280 wrote to memory of 352 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 123 PID 1280 wrote to memory of 352 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 123 PID 1280 wrote to memory of 352 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 123 PID 1280 wrote to memory of 352 1280 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 123 PID 352 wrote to memory of 1208 352 cmd.exe 220 PID 352 wrote to memory of 1208 352 cmd.exe 220 PID 352 wrote to memory of 1208 352 cmd.exe 220 PID 352 wrote to memory of 1208 352 cmd.exe 220
Processes
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\nqAIwAYs\hMUEIUcY.exe"C:\Users\Admin\nqAIwAYs\hMUEIUcY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2812
-
-
C:\ProgramData\mEsAQwgM\TCwwssEI.exe"C:\ProgramData\mEsAQwgM\TCwwssEI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2620
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"4⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"6⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"8⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2852 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"10⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3024 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"12⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"14⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"16⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"18⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"20⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"22⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"24⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"26⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"28⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"30⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"32⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics33⤵
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"34⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"36⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics37⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"38⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"40⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"42⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"44⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"46⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"48⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"50⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"52⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"54⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"56⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"58⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"60⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics61⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"62⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"64⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics65⤵PID:2568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"66⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics67⤵PID:1884
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"68⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics69⤵PID:2460
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"70⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics71⤵PID:1472
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"72⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics73⤵PID:2792
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"74⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics75⤵PID:1704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"76⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics77⤵PID:2760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"78⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics79⤵PID:2580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"80⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics81⤵PID:1948
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"82⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics83⤵PID:2688
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"84⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics85⤵PID:1564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"86⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics87⤵PID:872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"88⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics89⤵PID:2028
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"90⤵PID:300
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics91⤵PID:696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"92⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics93⤵PID:2808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"94⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics95⤵PID:1936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"96⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics97⤵PID:2780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"98⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics99⤵PID:2032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"100⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics101⤵PID:2212
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"102⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics103⤵PID:112
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"104⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics105⤵PID:768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"106⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics107⤵PID:2268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"108⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics109⤵PID:2972
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"110⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics111⤵PID:1624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"112⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics113⤵PID:2116
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"114⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics115⤵PID:2036
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"116⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics117⤵PID:356
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"118⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics119⤵PID:2488
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"120⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics121⤵PID:2192
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"122⤵PID:1180
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-