Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 12:35
Static task
static1
Behavioral task
behavioral1
Sample
e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe
-
Size
853KB
-
MD5
e20ae650aea056ef18a759f7484b59c0
-
SHA1
c416948b48eb19b0acad8ce8a1b0ec5a80b228fd
-
SHA256
72c9e4a0cc512bfda7c772489039d695f51198762b96873d63080b6c46b6c2b5
-
SHA512
5683a267476643c7012e7202e3f7da38c56516f32e202e537c0d6ccad390f8f57f24abb428c3576683deba863e8687b8c8e3b76c4642a43f44aa3e3f7bc96662
-
SSDEEP
24576:rlYi1dzS/7ur9wDEBpzsBqmy2euTonYS+p1m:Gsd+zureDEBpzsBqAedt+
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (82) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation QaQQQQkw.exe -
Executes dropped EXE 2 IoCs
pid Process 4736 QaQQQQkw.exe 3728 NOwgsEUA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QaQQQQkw.exe = "C:\\Users\\Admin\\gAkgggUQ\\QaQQQQkw.exe" QaQQQQkw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NOwgsEUA.exe = "C:\\ProgramData\\acsUAUAw\\NOwgsEUA.exe" NOwgsEUA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QaQQQQkw.exe = "C:\\Users\\Admin\\gAkgggUQ\\QaQQQQkw.exe" e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NOwgsEUA.exe = "C:\\ProgramData\\acsUAUAw\\NOwgsEUA.exe" e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe QaQQQQkw.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe QaQQQQkw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1440 reg.exe 4884 reg.exe 2956 reg.exe 1888 reg.exe 536 reg.exe 2608 reg.exe 3028 reg.exe 1416 reg.exe 2560 reg.exe 4460 reg.exe 948 reg.exe 4396 reg.exe 4828 reg.exe 536 reg.exe 5008 reg.exe 2440 reg.exe 1104 reg.exe 116 reg.exe 2752 reg.exe 1420 reg.exe 2812 reg.exe 4184 reg.exe 1936 reg.exe 1020 reg.exe 4608 reg.exe 4464 reg.exe 4644 reg.exe 1572 reg.exe 1692 reg.exe 4724 reg.exe 3612 reg.exe 1776 reg.exe 4788 reg.exe 4868 reg.exe 3368 reg.exe 3440 reg.exe 4136 reg.exe 4420 reg.exe 4540 reg.exe 3772 reg.exe 744 reg.exe 1928 reg.exe 1776 reg.exe 3452 reg.exe 2456 reg.exe 3272 reg.exe 2264 reg.exe 4300 reg.exe 4200 reg.exe 5104 reg.exe 3684 reg.exe 3192 reg.exe 1104 reg.exe 4044 reg.exe 1944 reg.exe 2572 reg.exe 2928 reg.exe 116 reg.exe 2104 reg.exe 4832 reg.exe 2976 reg.exe 1440 reg.exe 4804 reg.exe 4352 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4912 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4912 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4912 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4912 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1012 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1012 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1012 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 1012 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 644 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 644 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 644 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 644 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4508 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4508 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4508 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4508 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 316 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 316 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 316 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 316 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2468 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2468 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2468 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2468 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4932 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4932 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4932 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4932 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2968 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2968 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2968 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2968 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2928 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2928 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2928 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2928 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4652 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4652 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4652 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 4652 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 232 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 232 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 232 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 232 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2932 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2932 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2932 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 2932 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 3748 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 3748 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 3748 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 3748 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4736 QaQQQQkw.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe 4736 QaQQQQkw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4368 wrote to memory of 4736 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 81 PID 4368 wrote to memory of 4736 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 81 PID 4368 wrote to memory of 4736 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 81 PID 4368 wrote to memory of 3728 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 82 PID 4368 wrote to memory of 3728 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 82 PID 4368 wrote to memory of 3728 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 82 PID 4368 wrote to memory of 1492 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 83 PID 4368 wrote to memory of 1492 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 83 PID 4368 wrote to memory of 1492 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 83 PID 4368 wrote to memory of 4636 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 85 PID 4368 wrote to memory of 4636 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 85 PID 4368 wrote to memory of 4636 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 85 PID 4368 wrote to memory of 4804 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 86 PID 4368 wrote to memory of 4804 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 86 PID 4368 wrote to memory of 4804 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 86 PID 4368 wrote to memory of 536 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 87 PID 4368 wrote to memory of 536 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 87 PID 4368 wrote to memory of 536 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 87 PID 4368 wrote to memory of 4380 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 88 PID 4368 wrote to memory of 4380 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 88 PID 4368 wrote to memory of 4380 4368 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 88 PID 1492 wrote to memory of 4076 1492 cmd.exe 93 PID 1492 wrote to memory of 4076 1492 cmd.exe 93 PID 1492 wrote to memory of 4076 1492 cmd.exe 93 PID 4380 wrote to memory of 2408 4380 cmd.exe 94 PID 4380 wrote to memory of 2408 4380 cmd.exe 94 PID 4380 wrote to memory of 2408 4380 cmd.exe 94 PID 4076 wrote to memory of 4928 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 95 PID 4076 wrote to memory of 4928 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 95 PID 4076 wrote to memory of 4928 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 95 PID 4076 wrote to memory of 2976 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 97 PID 4076 wrote to memory of 2976 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 97 PID 4076 wrote to memory of 2976 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 97 PID 4076 wrote to memory of 4608 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 98 PID 4076 wrote to memory of 4608 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 98 PID 4076 wrote to memory of 4608 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 98 PID 4076 wrote to memory of 4328 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 99 PID 4076 wrote to memory of 4328 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 99 PID 4076 wrote to memory of 4328 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 99 PID 4076 wrote to memory of 4440 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 100 PID 4076 wrote to memory of 4440 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 100 PID 4076 wrote to memory of 4440 4076 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 100 PID 4928 wrote to memory of 2160 4928 cmd.exe 105 PID 4928 wrote to memory of 2160 4928 cmd.exe 105 PID 4928 wrote to memory of 2160 4928 cmd.exe 105 PID 4440 wrote to memory of 4516 4440 cmd.exe 106 PID 4440 wrote to memory of 4516 4440 cmd.exe 106 PID 4440 wrote to memory of 4516 4440 cmd.exe 106 PID 2160 wrote to memory of 2972 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 107 PID 2160 wrote to memory of 2972 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 107 PID 2160 wrote to memory of 2972 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 107 PID 2160 wrote to memory of 3160 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 109 PID 2160 wrote to memory of 3160 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 109 PID 2160 wrote to memory of 3160 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 109 PID 2160 wrote to memory of 3748 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 110 PID 2160 wrote to memory of 3748 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 110 PID 2160 wrote to memory of 3748 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 110 PID 2160 wrote to memory of 4016 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 111 PID 2160 wrote to memory of 4016 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 111 PID 2160 wrote to memory of 4016 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 111 PID 2160 wrote to memory of 3012 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 112 PID 2160 wrote to memory of 3012 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 112 PID 2160 wrote to memory of 3012 2160 e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe 112 PID 2972 wrote to memory of 4912 2972 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\gAkgggUQ\QaQQQQkw.exe"C:\Users\Admin\gAkgggUQ\QaQQQQkw.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4736
-
-
C:\ProgramData\acsUAUAw\NOwgsEUA.exe"C:\ProgramData\acsUAUAw\NOwgsEUA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"2⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"4⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"6⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"8⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"10⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics11⤵
- Suspicious behavior: EnumeratesProcesses
PID:644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"12⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"14⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics15⤵
- Suspicious behavior: EnumeratesProcesses
PID:316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"16⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"18⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"20⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"22⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"24⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"26⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics27⤵
- Suspicious behavior: EnumeratesProcesses
PID:232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"28⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"30⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"32⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics33⤵PID:4048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"34⤵PID:744
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV135⤵PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics35⤵PID:948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"36⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics37⤵PID:1832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"38⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics39⤵PID:324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"40⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics41⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"42⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics43⤵PID:4776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"44⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics45⤵PID:3392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"46⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics47⤵PID:3668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"48⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics49⤵PID:3956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"50⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics51⤵PID:2004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"52⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics53⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"54⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics55⤵PID:880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"56⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics57⤵PID:2452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"58⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics59⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"60⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics61⤵PID:3716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"62⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics63⤵PID:3232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"64⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics65⤵PID:2732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"66⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics67⤵PID:2076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"68⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics69⤵PID:3936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"70⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics71⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"72⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics73⤵PID:4628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"74⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics75⤵PID:4964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"76⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics77⤵PID:1488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"78⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics79⤵PID:4380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"80⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics81⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"82⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics83⤵PID:3524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"84⤵PID:1860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:4744
-
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics85⤵PID:1692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"86⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics87⤵PID:744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"88⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics89⤵PID:1996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"90⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics91⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"92⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics93⤵PID:4576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"94⤵PID:2688
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics95⤵PID:4036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"96⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics97⤵PID:3300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"98⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics99⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"100⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics101⤵PID:3272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"102⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics103⤵PID:4340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"104⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics105⤵PID:2816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"106⤵PID:2332
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics107⤵PID:1276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"108⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics109⤵PID:5048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"110⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics111⤵PID:5064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"112⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics113⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"114⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics115⤵PID:3308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"116⤵PID:4904
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics117⤵PID:1392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"118⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics119⤵PID:3884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"120⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics121⤵PID:4352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e20ae650aea056ef18a759f7484b59c0_NeikiAnalytics"122⤵PID:4348
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-