Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe
-
Size
193KB
-
MD5
a2501c3a1063bfbdd36b079fd4b44130
-
SHA1
51a5c4ef221ec6d9935d3728cee475195f5ca570
-
SHA256
901fd76c4a08403f733b0a874de2f60b94f7ea2bccb12fbbe9785e774c40d1e8
-
SHA512
4987c6e135b313cb8bbf1b1dabf41efef93e36f727484381d585895694232caa8797b2357d54d136ebedcb7caf9ba0e5e26085cfbfec147f87d804f11e8aa7ad
-
SSDEEP
3072:WrwpGWubJymslRasGPhkAKGYEZb7LsLLIICP3uwFwCrOW3b6FPqVX8l4:T8EB/G6ARZQs1iC
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
vIcowgcI.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation vIcowgcI.exe -
Executes dropped EXE 2 IoCs
Processes:
BcoYogMM.exevIcowgcI.exepid process 5040 BcoYogMM.exe 220 vIcowgcI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exevIcowgcI.exeBcoYogMM.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BcoYogMM.exe = "C:\\Users\\Admin\\bUswIkEs\\BcoYogMM.exe" a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vIcowgcI.exe = "C:\\ProgramData\\PkQcokkk\\vIcowgcI.exe" a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vIcowgcI.exe = "C:\\ProgramData\\PkQcokkk\\vIcowgcI.exe" vIcowgcI.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BcoYogMM.exe = "C:\\Users\\Admin\\bUswIkEs\\BcoYogMM.exe" BcoYogMM.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DgYAUwUo.exe = "C:\\Users\\Admin\\GMAIosAY\\DgYAUwUo.exe" a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\loMIIIsQ.exe = "C:\\ProgramData\\XqEkgcsE\\loMIIIsQ.exe" a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe -
Drops file in System32 directory 2 IoCs
Processes:
vIcowgcI.exedescription ioc process File created C:\Windows\SysWOW64\shell32.dll.exe vIcowgcI.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe vIcowgcI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 920 2312 WerFault.exe loMIIIsQ.exe 4324 848 WerFault.exe DgYAUwUo.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1388 reg.exe 5104 reg.exe 3572 reg.exe 1756 reg.exe 4368 reg.exe 4068 reg.exe 4932 reg.exe 2768 reg.exe 2200 reg.exe 1468 reg.exe 2980 reg.exe 2700 reg.exe 5096 reg.exe 3816 reg.exe 4212 reg.exe 4248 reg.exe 464 reg.exe 768 reg.exe 3008 reg.exe 1016 reg.exe 3012 reg.exe 4248 reg.exe 1724 reg.exe 1280 reg.exe 2384 reg.exe 4072 reg.exe 1832 reg.exe 1964 reg.exe 4996 reg.exe 5108 reg.exe 512 reg.exe 3988 reg.exe 2908 reg.exe 4584 reg.exe 1900 reg.exe 3008 reg.exe 3052 reg.exe 2404 reg.exe 2420 reg.exe 4800 reg.exe 920 reg.exe 3668 reg.exe 4408 reg.exe 1900 reg.exe 1244 reg.exe 4272 reg.exe 4596 reg.exe 1640 reg.exe 1200 reg.exe 1660 reg.exe 528 reg.exe 3092 reg.exe 464 reg.exe 4040 reg.exe 508 reg.exe 1724 reg.exe 3616 reg.exe 4900 reg.exe 5096 reg.exe 444 reg.exe 2576 reg.exe 968 reg.exe 1964 reg.exe 3064 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exepid process 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 2292 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 2292 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 2292 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 2292 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4268 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4268 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4268 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4268 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3668 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3668 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3668 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3668 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4408 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4408 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4408 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4408 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4036 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4036 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4036 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4036 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3624 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3624 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3624 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3624 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 1400 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 1400 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 1400 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 1400 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3940 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3940 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3940 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 3940 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4500 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4500 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4500 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 4500 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 2980 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 2980 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 2980 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 2980 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 2852 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 2852 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 2852 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe 2852 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vIcowgcI.exepid process 220 vIcowgcI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
vIcowgcI.exepid process 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe 220 vIcowgcI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.execmd.execmd.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.execmd.execmd.exea2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.execmd.exedescription pid process target process PID 3012 wrote to memory of 5040 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe BcoYogMM.exe PID 3012 wrote to memory of 5040 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe BcoYogMM.exe PID 3012 wrote to memory of 5040 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe BcoYogMM.exe PID 3012 wrote to memory of 220 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe vIcowgcI.exe PID 3012 wrote to memory of 220 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe vIcowgcI.exe PID 3012 wrote to memory of 220 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe vIcowgcI.exe PID 3012 wrote to memory of 3468 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 3012 wrote to memory of 3468 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 3012 wrote to memory of 3468 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 3012 wrote to memory of 3988 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3012 wrote to memory of 3988 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3012 wrote to memory of 3988 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3012 wrote to memory of 1652 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3012 wrote to memory of 1652 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3012 wrote to memory of 1652 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3012 wrote to memory of 4804 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3012 wrote to memory of 4804 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3012 wrote to memory of 4804 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3012 wrote to memory of 4676 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 3012 wrote to memory of 4676 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 3012 wrote to memory of 4676 3012 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 3468 wrote to memory of 3504 3468 cmd.exe a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe PID 3468 wrote to memory of 3504 3468 cmd.exe a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe PID 3468 wrote to memory of 3504 3468 cmd.exe a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe PID 4676 wrote to memory of 2152 4676 cmd.exe cscript.exe PID 4676 wrote to memory of 2152 4676 cmd.exe cscript.exe PID 4676 wrote to memory of 2152 4676 cmd.exe cscript.exe PID 3504 wrote to memory of 4552 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 3504 wrote to memory of 4552 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 3504 wrote to memory of 4552 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 4552 wrote to memory of 3528 4552 cmd.exe a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe PID 4552 wrote to memory of 3528 4552 cmd.exe a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe PID 4552 wrote to memory of 3528 4552 cmd.exe a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe PID 3504 wrote to memory of 2236 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3504 wrote to memory of 2236 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3504 wrote to memory of 2236 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3504 wrote to memory of 4008 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3504 wrote to memory of 4008 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3504 wrote to memory of 4008 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3504 wrote to memory of 4148 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3504 wrote to memory of 4148 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3504 wrote to memory of 4148 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3504 wrote to memory of 2012 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 3504 wrote to memory of 2012 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 3504 wrote to memory of 2012 3504 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 2012 wrote to memory of 1884 2012 cmd.exe cscript.exe PID 2012 wrote to memory of 1884 2012 cmd.exe cscript.exe PID 2012 wrote to memory of 1884 2012 cmd.exe cscript.exe PID 3528 wrote to memory of 532 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 3528 wrote to memory of 532 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 3528 wrote to memory of 532 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe PID 532 wrote to memory of 4528 532 cmd.exe a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe PID 532 wrote to memory of 4528 532 cmd.exe a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe PID 532 wrote to memory of 4528 532 cmd.exe a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe PID 3528 wrote to memory of 1756 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3528 wrote to memory of 1756 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3528 wrote to memory of 1756 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3528 wrote to memory of 3076 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3528 wrote to memory of 3076 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3528 wrote to memory of 3076 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3528 wrote to memory of 2304 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3528 wrote to memory of 2304 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3528 wrote to memory of 2304 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe reg.exe PID 3528 wrote to memory of 1724 3528 a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\bUswIkEs\BcoYogMM.exe"C:\Users\Admin\bUswIkEs\BcoYogMM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\ProgramData\PkQcokkk\vIcowgcI.exe"C:\ProgramData\PkQcokkk\vIcowgcI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"8⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics9⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"10⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics11⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"12⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics13⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"14⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics15⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"16⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics17⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"18⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV119⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics19⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"20⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics21⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"22⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics23⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"24⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics25⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"26⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics27⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"28⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics29⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"30⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV131⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics31⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"32⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics33⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"34⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics35⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"36⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics37⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"38⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics39⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"40⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics41⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"42⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics43⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"44⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics45⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"46⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics47⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"48⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics49⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"50⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics51⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"52⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics53⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"54⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics55⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"56⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics57⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"58⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics59⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"60⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics61⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"62⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics63⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"64⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics65⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"66⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics67⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"68⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics69⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"70⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics71⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"72⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics73⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"74⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics75⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"76⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics77⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"78⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics79⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"80⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics81⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"82⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics83⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"84⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics85⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"86⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics87⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"88⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics89⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"90⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics91⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"92⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics93⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"94⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics95⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"96⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics97⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"98⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics99⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"100⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics101⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"102⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics103⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"104⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics105⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"106⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics107⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"108⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics109⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"110⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics111⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"112⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics113⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"114⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics115⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"116⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics117⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"118⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics119⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"120⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics121⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"122⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics123⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"124⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics125⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"126⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics127⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"128⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics129⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"130⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics131⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"132⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics133⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"134⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics135⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"136⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics137⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"138⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1139⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics139⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"140⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics141⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"142⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics143⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"144⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics145⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"146⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1147⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics147⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"148⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics149⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"150⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics151⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"152⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics153⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"154⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics155⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"156⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics157⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"158⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics159⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"160⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics161⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"162⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1163⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics163⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"164⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics165⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"166⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics167⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"168⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics169⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"170⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics171⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"172⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics173⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"174⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics175⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"176⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics177⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"178⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1179⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics179⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"180⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1181⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics181⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"182⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics183⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"184⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics185⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"186⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics187⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"188⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1189⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics189⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"190⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1191⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics191⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"192⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics193⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"194⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics195⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"196⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1197⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics197⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"198⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1199⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics199⤵
- Adds Run key to start application
-
C:\Users\Admin\GMAIosAY\DgYAUwUo.exe"C:\Users\Admin\GMAIosAY\DgYAUwUo.exe"200⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 224201⤵
- Program crash
-
C:\ProgramData\XqEkgcsE\loMIIIsQ.exe"C:\ProgramData\XqEkgcsE\loMIIIsQ.exe"200⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 224201⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"200⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1201⤵
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics201⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics"202⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1203⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1202⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2202⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1203⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f202⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NIEAkIEk.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""202⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs203⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1200⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1201⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2200⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f200⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1201⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZoAAkwAU.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""200⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1201⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs201⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1198⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1199⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2198⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1199⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f198⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1199⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UUAMsowE.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""198⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1199⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs199⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1196⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2196⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1197⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f196⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1197⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vwYggwMM.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""196⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1197⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs197⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1194⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2194⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1195⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f194⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1195⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LSIgYwIk.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""194⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1195⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs195⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1192⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1193⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2192⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1193⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f192⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qGUsEUgo.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""192⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs193⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1190⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1191⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2190⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1191⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f190⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rGoUAMcI.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""190⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1191⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs191⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1188⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1189⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2188⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f188⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1189⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kIgYQUUE.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""188⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs189⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1186⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2186⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1187⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f186⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lkUkIQwo.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""186⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs187⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1184⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2184⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f184⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jqgAkUQI.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""184⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1185⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs185⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1182⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2182⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f182⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PgYgcggo.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""182⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs183⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1180⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2180⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1181⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f180⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AqwMEQsU.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""180⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs181⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1178⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2178⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1179⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f178⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1179⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RSQIgoUE.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""178⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs179⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1176⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1177⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2176⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1177⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f176⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1177⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dYQIEgsI.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""176⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1177⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs177⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1174⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1175⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2174⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f174⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TwIIAkYQ.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""174⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1175⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs175⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1172⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1173⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2172⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f172⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tikksIMo.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""172⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1173⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs173⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1170⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2170⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f170⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lUEUQwIY.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""170⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs171⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1168⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1169⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2168⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1169⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f168⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ycMsEEsA.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""168⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs169⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1166⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1167⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2166⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f166⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dAEUMUYE.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""166⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs167⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1164⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1165⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2164⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f164⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uQoIYoQg.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""164⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs165⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1162⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2162⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f162⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1163⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HGkAkQMc.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""162⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs163⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1160⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2160⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f160⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bIIUkoQY.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""160⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs161⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1158⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2158⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f158⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GAAMosgc.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""158⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs159⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1156⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1157⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2156⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1157⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f156⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1157⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uoEscwYs.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""156⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs157⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1154⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2154⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f154⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Mkogkcos.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""154⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs155⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1152⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2152⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1153⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f152⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mggUMAQc.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""152⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1153⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs153⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1150⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2150⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f150⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sewMMcAM.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""150⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1151⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs151⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1148⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2148⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f148⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1149⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wQoYYcQE.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""148⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs149⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1146⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2146⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f146⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MQYkUIMU.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""146⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs147⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1144⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2144⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f144⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1145⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NOYwsYwQ.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""144⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1145⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs145⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1142⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2142⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f142⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vgYMcIMk.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""142⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs143⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1140⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1141⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2140⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1141⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f140⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1141⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TAskIcAc.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""140⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs141⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1138⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2138⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f138⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uaoQwYcQ.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""138⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs139⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1136⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2136⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f136⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lScEsIEs.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""136⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs137⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1134⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2134⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f134⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yucosYYo.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""134⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs135⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1132⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1133⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2132⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f132⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zAcAcgsQ.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""132⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs133⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1130⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2130⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f130⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RyAMAAgY.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""130⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs131⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1128⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2128⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f128⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\baQwAskU.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""128⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs129⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1126⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2126⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f126⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1127⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PmYYocog.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""126⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs127⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1124⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2124⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f124⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wUAkwYss.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""124⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs125⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1122⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1123⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2122⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1123⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f122⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SiosIMAg.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""122⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs123⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1120⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2120⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f120⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xMccEUgU.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""120⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs121⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1118⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2118⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f118⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ecYIQMgc.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""118⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs119⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1116⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2116⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f116⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PgIgsAgM.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""116⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs117⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1114⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2114⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f114⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\asYEsUEU.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""114⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs115⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1112⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2112⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f112⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DEsIskks.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""112⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs113⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1110⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2110⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f110⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iegwwEEE.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""110⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs111⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1108⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2108⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f108⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JSYkQYYw.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""108⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs109⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1106⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2106⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f106⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VYIsYkAg.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""106⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs107⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1104⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2104⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f104⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VQMcgwwI.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""104⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs105⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1102⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2102⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f102⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PSEEMEwg.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""102⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs103⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1100⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2100⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f100⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wuogcsUM.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""100⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs101⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 198⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 298⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f98⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zCwsEAcg.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""98⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs99⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 196⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 296⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f96⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uEwEQgsQ.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""96⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs97⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 194⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 294⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f94⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fQQcgoMs.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""94⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs95⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 192⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 292⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f92⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lKsAwEMk.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""92⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs93⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 190⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 290⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f90⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HuIUwcko.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""90⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs91⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 188⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 288⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f88⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EaMUAwsY.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""88⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs89⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 186⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 286⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f86⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OIMwwgoE.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""86⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs87⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 184⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 284⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f84⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eYQkEEQs.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""84⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs85⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 182⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 282⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f82⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\leoggsEo.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""82⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs83⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 180⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 280⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f80⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AcsEgocQ.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""80⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs81⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 178⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 278⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f78⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZKYcMcIA.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""78⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs79⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 176⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 276⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f76⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\naQQAcoM.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""76⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs77⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 174⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 274⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f74⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WIQgYQEI.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""74⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs75⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 172⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 272⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f72⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uOIIIoUE.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""72⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs73⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 170⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 270⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f70⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TqQgAUkE.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""70⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs71⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 168⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 268⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f68⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pwIkscUY.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""68⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs69⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 166⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 266⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f66⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jSwUsUIk.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""66⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs67⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f64⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV165⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lWYYUAYk.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""64⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs65⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 162⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 262⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f62⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UEUwowsI.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""62⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs63⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 160⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV161⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 260⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f60⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yUowQEkM.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""60⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs61⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 158⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 258⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f58⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NCcowoUU.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""58⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs59⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 156⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 256⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f56⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OEwMwkMk.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""56⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs57⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 154⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 254⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f54⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oIwYsAwI.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""54⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs55⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qUcMcssM.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""52⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV151⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\issUQocg.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""50⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV151⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zYgsMccU.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""48⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GuoEskAA.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""46⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WyUggUsg.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""44⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JSswUgAQ.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""42⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VCYkgQws.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""40⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\huskkgkA.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""38⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WwIQUAMI.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""36⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ukogoMcc.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""34⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\quQQgAog.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""32⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV131⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oYIYcEwM.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""30⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WKQYccoU.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""28⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ayUYQEYg.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""26⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AGEMoswg.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""24⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV123⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LyAwUksw.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""22⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CkgUEMoo.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""20⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\myEQsEQM.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""18⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XUQAYcEE.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""16⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hQYgAUcw.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""14⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fmwIQwkE.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""12⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xGgEoAgg.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""10⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tOosIkMw.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""8⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ECYUIAYQ.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""6⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\saEUcoog.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KQsgQQEI.bat" "C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalytics.exe""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 848 -ip 8482⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2312 -ip 23122⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\background.png.exeFilesize
322KB
MD50831f80cb0dfb1b6ffc0111af5a56d5c
SHA189b2d483a94cc6d43691e8202602754e5453f5e8
SHA2561d75ce1a96553491c26508363c224524b49bbb0778fbe19c14d897f0997ecdf3
SHA5126778f3f248a7e113beeb07d7f315f29170127bc29e35767ba5bfb01120ddd45dd6abc68e93ba7e084c59041c48d6f707a98e004afb36e2dabb4601995743f45d
-
C:\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\device.png.exeFilesize
243KB
MD5a9a5e5e77510165ebaecd578233f8393
SHA1bba47fd5d3c970ab0b089cc532229445b7d23eb1
SHA2564c1db28063b496d835dfc3560f2c64a2d027fb696c9a9f7994fbc843eea37f4a
SHA51264052e16612990420ef5cd6880bda6cae7d7041d1b55e20e2fb60254582f2fdfda357e67ae2cb37373127b805cef45c496fdb65eb69df4dd695290b25e314063
-
C:\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\overlay.png.exeFilesize
213KB
MD5d3417d7b56f8e9e24347dbbc87047628
SHA1fee39927ac6c910073c59f62a31479392aeaef1b
SHA2569c90b0047a86e3be9a340933c84009be551c2d0aa64519a1feeaaae59be9c0a8
SHA5120238eda21308d77873db47fc8e44a1137ec3ab305e1f80baabf30adfa782d67e5190a92c98903ed21db1243a371dbb13eb1486a851eed999c00c26a38a0f9bda
-
C:\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\superbar.png.exeFilesize
230KB
MD5c40f496f36396d2042caffde4e34246f
SHA16c8c6a82f290ee57c78309bb0327f21e2eedabf6
SHA2562c1c4494278d78234be7dadad6bd134d7e2f4cb9eb10a410c5d18c3e1775b45f
SHA512b6caaa52a677378dc93f0822549c54a19996bbbbc8c19279f0d81f674ae3bb56d10fdf5982f112edaed4017854a40c56d9104b2839fe0be4e2fecc748904b48f
-
C:\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\background.png.exeFilesize
321KB
MD52c1f1e930cacbe28353c395eed133060
SHA16655fd7fc8f524fcc50535ac117597360aff76e0
SHA256028d7513362740a2f88149cb396f1372e973f4cdf1f075cd06869b998954eb50
SHA5120fb1f89e23b4207771de5f664cdb9812256ff8f14fff8ad6ee58a8e16e0b92edeb9be9d8ca61cf4e0bfaa032367120104dbad23a4a92729250e98885717c96a2
-
C:\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\watermark.png.exeFilesize
215KB
MD59b8ee3837d33fafcfd16f1a34440407b
SHA1478040336db0b8314ffe1d0bca2a63827612c003
SHA256fc5cef1d4e5cdbbde97a6c075eab86e7ebae896dc0c3155d1c9343b6201f2452
SHA512bd0c25583439696a040ecde5d50402257a01517e9482d0d5133f1ac241a4b2661516141dbe37d2e199d777c182f2417d09980f4de118691949a360704d10fda6
-
C:\ProgramData\Microsoft\User Account Pictures\guest.png.exeFilesize
203KB
MD59228a269e2ed610fd85f6c8ee569972a
SHA146a71dc7b2466f47ccc0ffb376baa033c9a49b02
SHA2560020d2c2227ed555b75ed52230bbebf2c89e56e0e9daf201c5f8c4f6ddcab03a
SHA512971a89dab36da10fa5564c97d515395685b325036564f20f5af7e4ba2d99b9e69f9ec27eb9d74b38b89cf4fefafd063c14b825862194dccbd6586136b97e5275
-
C:\ProgramData\PkQcokkk\vIcowgcI.exeFilesize
187KB
MD51ba9d6367dd5285411b11fb8b5769f04
SHA14480eeb38eb8712795db18a631c0005ed21499e6
SHA25689f9fa7a89f440a6fe63eaf008480750030987517ba8f748ad5b3cab99f9329e
SHA5124d14f1a9a89ffb23ce7e073244dec8affa7f98bf7b13b376afc98a6f0786553dc4f1f997e79dfe32fdda859e24a93b7bb56bc0bce01c69707c4b087a62d65c78
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\aghbiahbpaijignceidepookljebhfak\Icons\256.png.exeFilesize
207KB
MD5d747735385763745ffd4ee59f0c8e786
SHA16696e98354c22997c1d885d2c9eadbf08f19cd0c
SHA2567d65556c6cb319ec817a5bd88d4ed495cca3064c1d2bb553fa67522210d73d25
SHA512897f7ed84b65f6d8199a4f4c1b584fdba071d730bc0bcde6aae554a6be21e02d45636622d139a3c490a3210698dc49b1a3a2ca92e6d16f08a357865d55da4326
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\aghbiahbpaijignceidepookljebhfak\Icons\96.png.exeFilesize
194KB
MD51986608619ec4ff1a41d38f5def5f36d
SHA1a65b39cc2a986a7f9ca251ce8b5cff72c1e2787d
SHA256b9fa8744fc3332f7705772c72482edfbdc0520e8d2888f627993add403ed8389
SHA512f91f43cc732ccb8a309bae343adc4bc24f49ae95a18f45a2d1045012f1370231bdcaff58c7e967f93bda14b811e1500e6832ec55e3c550d98f11a5519537319b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons\128.png.exeFilesize
198KB
MD5b7ae46f1e26a9d79107cd1eb65ab28c4
SHA175d70553f345201638bad9595cd7210ea5ce5141
SHA256192c64cec1599d6e0ce6efc96683609494c6701962fc0a133dc637fae243a2b4
SHA51217c40a5abfd2c9445ac3fdcae4530e6f22c806893c8b769a79d4ad295a825b069d4de774239a9cbd30bee4980f2fd672c00d9b698fa1d1880f074f15fef3644f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons\64.png.exeFilesize
206KB
MD58e864b807d626cc29b00692d0cacae58
SHA17dda7101f2a87c33077f85efb9e4b7b5efe3dc01
SHA256093cc1d846abb8f4a549d50a22a2982a1d2b776b77d8788bb2f345c38e0a1703
SHA512023a260f80c0f49b5c0d51e2f01db5962682be63c988923d8c14f30eff94d02ae34b94771ca2fdbc4030c791e207c83984f37fdedefd640f33c230b683f6e5d7
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exeFilesize
1.8MB
MD565bea8fa5efcb2fb88e05bbeb3f20855
SHA1d2d4783d406ae2212d43cca90a5bf61750d894ef
SHA256fad37a577a3a68e8a061358bf24ead826989b72e8fb4c3fbfd39fbcb2b155547
SHA51294497942dd92f96c66ec24d6010b686ef4067ff57d01f20db96dec80bf8a6fb4bb5feefae61401b4d79f96875961574e74e214fce454e6075dd37c59a03cfcd0
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\LocalState\PinnedTiles\26310719480\tinytile.png.exeFilesize
188KB
MD595d87d8fe26570787cce4cfb3f487e0b
SHA19bf69868169873fc4f909d040d40dd862eff1e4e
SHA256d0e8fb32a0ee0a0a8539981e84c13e51a1e49cb6fdc6e16b47c188e9f66c4437
SHA51228ef55986b6e0c1d4b6a56376e6e234d9ba3f2a265815c87e30f17a19c9d16e1e87a0f6f841f91738e13a3d7e88bfad4141fab637c20a5d35794f0f8deef24c9
-
C:\Users\Admin\AppData\Local\Temp\AgIK.exeFilesize
198KB
MD5ee61ec0bc83ab06699ebe2378239399b
SHA188a6e4e2f4e4db4b5b15f4cb5661d1ec7e6de7ff
SHA25696a9cdf6c098ba2baac69cd798cdf113df07ec8f482fd931ebb46b745c80e9f3
SHA5126d37acbc45e7fb87b8ca0110909530ea3275ef4e00b1e7fba643416fc83cdafcf24e91bec86c05642fdfc0af99e8792ef410118bc143be1e4b4ed4ddeb252481
-
C:\Users\Admin\AppData\Local\Temp\Bkwc.exeFilesize
756KB
MD556272520499c0eac82a1dbaccc934b7f
SHA1f081a29cde622ca0dd7530ab4aea94b5783f44fa
SHA2569af2a2cfe0382a28dfc8c9275831f97157a9e5538182801ed4c79a31a04d1e29
SHA512e1a343a946a89969255af5eedb2e3e1f8226fe9f9f536fd284af74804f89173e16c6070d955d02e29e0b3b114161c46bc28d7d1e8448ba8865e0b9fd2fca7f0d
-
C:\Users\Admin\AppData\Local\Temp\EAAY.exeFilesize
218KB
MD5f2836cb15a187e988b78496b263b2111
SHA1868fbae86a2d5e1a594f8a8ce80b115123baaa61
SHA2564b2f93147e59e87c1798ab3fe678b41e34cde68e720c8db0a4defb868dc9c9a8
SHA5128b020fb2f5ac5a584c3a5123872de1be1458aec30d390cc1da72f36a57e764d3666b6d11ebff042c255299b0fb60285a8e94516f53e2987b6eac3f20375e4347
-
C:\Users\Admin\AppData\Local\Temp\FAci.icoFilesize
4KB
MD5f31b7f660ecbc5e170657187cedd7942
SHA142f5efe966968c2b1f92fadd7c85863956014fb4
SHA256684e75b6fdb9a7203e03c630a66a3710ace32aa78581311ba38e3f26737feae6
SHA51262787378cea556d2f13cd567ae8407a596139943af4405e8def302d62f64e19edb258dce44429162ac78b7cfc2260915c93ff6b114b0f910d8d64bf61bdd0462
-
C:\Users\Admin\AppData\Local\Temp\FgMs.exeFilesize
188KB
MD52f7a4d74196d87c17d78573500984b10
SHA1257c11e92e24de17c1e89667b1751e5b4df687c8
SHA256d24044ccdaf6bda0a649cfafb2195d8c840e5008802a1cd89c9ef9771455a134
SHA512fa343cbbf711960aa23b2a7fe1d566aaed64e1bd9c23d8c5e01f48264fc86c68228924d57ff80ca4b46755ac607764c72347b53b35c5d10971ff6932ba2bb5af
-
C:\Users\Admin\AppData\Local\Temp\HoMg.exeFilesize
195KB
MD5e64c4524a4854b5a8b305d329656152e
SHA1dffd14f6c1a4329a8be8fe32f94cf15f02f77322
SHA256360c0c25d5749b6d8f540b277debabe153bf7bdf7332acea538426c588292099
SHA5123033cccc6c6c6b4c5ae0a4828d5aaca8c3a77d0ce1a0ba6bdd49ec832efa7bca3dd67e574ba669a8805063df7a19dce05cbdea603325ba32fdacb2d138f046a1
-
C:\Users\Admin\AppData\Local\Temp\JEcE.exeFilesize
650KB
MD5aa019a068b37c6d504f72c5f7ea0b6fd
SHA1c7c4241d68ec4a36406a4c9959e0a80a300155a2
SHA2561554de8b57d99c263ee0c02ff008d3efb9bc75cf0c5228c8fd212f8dfd50c7f1
SHA512d470fe379b1bfe3eb0fa975406971d3c0dc3b514f4c4bd4138e5fef486e3f23f7746188581d64406fdf4607100fe76a30dfd19276f1f2093fb3f92dce59284fb
-
C:\Users\Admin\AppData\Local\Temp\JQoq.exeFilesize
190KB
MD5f3f7ce63bb7913148cb9729561b7191b
SHA17d2873836520a7d0d33cdc6a9ed60141f6eb0711
SHA256ef7b3c73aa511a868353cb61cb883107fa4c263781af3e500b93bb2622cbdbd7
SHA51214ece01a63f1358b7655165e92fb405cb4423a6707b984f8e8c7e0c9c1ede66a5304ca2776bed971c6edda76372ec1e976b360c63b7383e61ece6e8f44f99683
-
C:\Users\Admin\AppData\Local\Temp\JYkG.exeFilesize
199KB
MD5029ddc467122fcb9aa54e9ac3542ff70
SHA1adc2cf4a905a09935701673bab86c35438cb7ea2
SHA256d25d8213b064bfc708aa4ec4fc1275808009d20edc6184bec86150412f0c1f16
SHA5127c12f23e5cd6bce0fa37d695980f40f524d72901df7df8f4e84c07288ca3f852dcecc28b1cbcd5080ddf91ce40eb910c9aeb7759431fd81be5a292736a3de698
-
C:\Users\Admin\AppData\Local\Temp\KMwA.exeFilesize
197KB
MD54899eea4f607b8ea5524ca3ccae0d9e2
SHA10ef188f9b06389a0f4599b6594277a014482d035
SHA256ff2d96a81ae3365d2f64f2375428943bb6fa590c19ef2f3b6e4c9d9cfcc04619
SHA512d1c9f03206bfeba95552e93fa062d71b899d8b04396374a11fea8a2ec707d727dae0cb09218ffb2c1a53b72ca0059bf038d5e2d065d3e932022cf0538b24059c
-
C:\Users\Admin\AppData\Local\Temp\KQsgQQEI.batFilesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\KkIu.exeFilesize
209KB
MD592115c8e470d787cba67d959df199fa2
SHA1574058c1176d8cdb77b6100983dd6c43fd077dc8
SHA256ad7ec1b899ecc344db939e9be0a56fa67fd54fa7bde147aca16ddddfbc45fa7c
SHA512fda1be4c0782b320e9c2f058b5d2963e747b591f824a533fa0e55a6a4038a629bcfc2a8817df648a04d9715c5723c98fc438d34feb52103f387afc7b839ef836
-
C:\Users\Admin\AppData\Local\Temp\LUIE.icoFilesize
4KB
MD5d07076334c046eb9c4fdf5ec067b2f99
SHA15d411403fed6aec47f892c4eaa1bafcde56c4ea9
SHA256a3bab202df49acbe84fbe663b6403ed3a44f5fc963fd99081e3f769db6cecc86
SHA5122315de6a3b973fdf0c4b4e88217cc5df6efac0c672525ea96d64abf1e6ea22d7f27a89828863c1546eec999e04c80c4177b440ad0505b218092c40cee0e2f2bd
-
C:\Users\Admin\AppData\Local\Temp\MQQS.exeFilesize
417KB
MD5b409d249b548b94fd267c91f505f585e
SHA1659a8efb38e11e281475071d89f637b92f392285
SHA256a2c7b908f9191f395df3bd2a74951955a3bbbc87e26893844a306107ee2db878
SHA512fe3c0424ee92bfc6cda3797794aeb8d156ffd4681e55acabba668b6bf311aa66c46ad421a5a08e02f10bf4d6f02b8046a537282448340036ce5a14497e3fb54c
-
C:\Users\Admin\AppData\Local\Temp\NEQA.exeFilesize
207KB
MD5608be6bac15a4345828ed886b2895c04
SHA13a005efe61e1583932f793a6e19b31cf514738a4
SHA25660bbbee84d78896f09bfb260b86976e4b6a193737b2db7080f4d99f6ec89e651
SHA5123d042b2b7001d4a466f4a704d337a70e1ebc9b7a5ad5384828c14cd49333428981e599007dd10608463129cb6255b75afb0e2702840ed7ae04439919e3f33cdd
-
C:\Users\Admin\AppData\Local\Temp\NMQQ.exeFilesize
459KB
MD540953509bdd849bd0759f88ace456037
SHA1973e2c84b8efa397391b15b251e419501909a599
SHA25662d07c9058a94b069d4ba4a9b2cd0885485181160e8b04bd8b4ce22b3c1cc666
SHA5120127016ba266cf8cb0fc3fea9053fe5a4e3126ec88eb6f197ab5d2452fb67e267087b3550437e89604c0fa395d88aac5ff44f151773d1983dec9911432692e44
-
C:\Users\Admin\AppData\Local\Temp\OsMK.exeFilesize
205KB
MD5f57e92711ba512d0fad0ca7c06a1ae52
SHA172a58de6a848e42eb7d7320bad0f5f898f9b2dfb
SHA2563c3be0ab7ca936bd89fac80e30e8e9e2cba075024d040eb2d68e846b8e3dc545
SHA5121d72be073043c24c6055a320b6285300459761ba249601a84f90c885cec90bba05d2a6b239570b7d8669612c366a17fdb9bd20a05f786f94c5a2b20ef9df0e5d
-
C:\Users\Admin\AppData\Local\Temp\PAsy.exeFilesize
591KB
MD58c825bdba5d274ed3f224cb015ffdd95
SHA1007430ee7e4e1f213a4f3490500b668fa8035e20
SHA256792b0bfb3e04422ee77441ea2bec1533a7550e9b31c7a6142e3f2c341c1e4c56
SHA51221cd9c40703b75311d777be3cadcd69e8f7dc290a1ca66e53b6d5c8fe4d1c949c36e0e86d0763f8d97360e325a2719f7f0e011d69795a1113d198dbf71068ec2
-
C:\Users\Admin\AppData\Local\Temp\QIEc.exeFilesize
188KB
MD5dfade9d00d3da828053593dcc820288b
SHA18779454cad99b51d1d4dd0e19645aaeeaab2e588
SHA256d811ef2b48342bbbf9f581155ba98c9a691db153ab427806f289a9f055f896d8
SHA512a2c99b2d763549b2faa09e58f4eeae406aa9a5e0af89c082577ccbb2f388945e9af20343bda6e7a55ca7dda29473d1279961e72dd8f2256f506ec76732bdc8f7
-
C:\Users\Admin\AppData\Local\Temp\QYIa.exeFilesize
202KB
MD515fb87e11e525aa613fca25474c21e6c
SHA1e1bbee339c68ce51b523efe38c2dee368097392e
SHA256ea01e569adb20e06c310e93eae71acf43453b6fa076483d528a47087e9ff578b
SHA51206032e5bc383adfc19f345b9db4fc5ab88dcdc5bb59488b100b7ff70be65d5cb2ee5c426a36c32156e51c3f87b2ef07fe6dc6faa2790209fe6ce20b6354b2cd3
-
C:\Users\Admin\AppData\Local\Temp\QkUA.exeFilesize
823KB
MD511854225c68afefdbfb2da6bd745a956
SHA17ab11c716b07b79eca7696143208c182cad9b2d4
SHA256d75ed3cf31449be27b825130de1fe3439e63ec4760aa33031798dc90c287b9af
SHA512142b758fd122057373c0bc9db6803f07100e59f4150dac3bb1085da4e769cd552ad4cf3e45f3ea496e9d6144436e7d59be7ce5b2a477eef73d0c35cbeb67acf4
-
C:\Users\Admin\AppData\Local\Temp\TMgC.exeFilesize
803KB
MD5e0e401ebc94933ff254c7b36ef286ab5
SHA1e127e37def9ecb7e9b7caa9d2ada51dcbc1c3b73
SHA256a2e123ba62554f9269888bdf9a2edc9faf1f09f2d81b70203f2a783d63c996a2
SHA5124b2f641549e593615f03f2c8847d6b042de9a45ec48ba80fecd638ca53afba5c4597e2c1eb6b311e7ca962254eb8f9c64cf3cf385bff4665f2ab6f94ba329011
-
C:\Users\Admin\AppData\Local\Temp\TYcq.exeFilesize
207KB
MD5d4cabedf09dcfdb62374585eeec03e83
SHA1501eb701704e4d76132ef0e02c9358a6919bae38
SHA2565dae0d64fe04e0930a032e736862dae25927bfd52c68f18d6e9fe9211a2b7a3f
SHA512b62099d2e2eec6e82d852113b679a0827c354b9623ab53f215d126bb95f1dc79d648d861db1a726c0929cb0e05a32666660f82d05382f6afa2288823c8eb92d3
-
C:\Users\Admin\AppData\Local\Temp\UMQU.exeFilesize
205KB
MD5afcb77f4be238d86b9d1fe937e70261b
SHA154d606519c4ba4c51262c88fbf7425dc8e114586
SHA2561b1ec6bbb066e97d34488f697e51b50daa74a711992b1b2fdf7c3d775ef9a1b6
SHA5120190559ec3436e4088e34225858c73e4160d282be9e8d4de93fcb082939848d0ab6394cb9a15e5a02080b8540bbbaeb14eb6b14b946962cb73fbda03dfc6bf87
-
C:\Users\Admin\AppData\Local\Temp\UcgI.exeFilesize
193KB
MD53c6e8dd8aa0d8e5fa6ead8f2a8738ace
SHA1b2fe8dd713e7781ad65443eca6fcd11d4dd9468e
SHA256f1886292737ca078b1489d2d5089c57f554eb96dd53703db8e2ba72abad25ebe
SHA5129f8d4dbedf550f89c7a59c4a02d759d8b578af2dd731e873e008231a7738f0fcf1449eded30d5af18ee1db7e75fa75476d805706a2d79b06ebcf9eb614c6201f
-
C:\Users\Admin\AppData\Local\Temp\WwQq.exeFilesize
200KB
MD5dfe1c22a6c76eec8e178327fe6fcd4bb
SHA14ffd4168fc2b2948808bc946319e496c2f462537
SHA2569c7cd0904f1f960849141b7f94ea57c0f2362ecb5cff94a6974af8f5af80156b
SHA51298519cfad3d1640790ea0f4ec0ebad07ca11f844ae6b10fd32eb8381c9f81cc823ed9b67e0bd288d765d1ae565bee10b85030007cfda54dd40d5450e5dc29f2c
-
C:\Users\Admin\AppData\Local\Temp\XIcy.exeFilesize
225KB
MD552915398fc9babdf25e436fc58d0ee58
SHA1edfa45f461d485f41b234d8c731e75b2f0bb2c82
SHA2562887c8ed9a12be92894626a18128d3db4d06a819714665a2bee6b878ceb24082
SHA512ed4088a87b271f8f777d2528c2b3bae3b3faecde44a7b79cd72806c7a5cb850c2cc993ee4c75cd79c5a3a00857929dd40822ae764d0a2cd3b8a05de653f6825b
-
C:\Users\Admin\AppData\Local\Temp\XQQC.exeFilesize
190KB
MD54db2cd614b816f75ef7bd8d0ab6ea96c
SHA1cbc42e3cb21dfe9c33a050303c58a969d82205b1
SHA25685a2476269aa3b4f6f0e291f1cfbb4010de17e7e4d8890ca6617c869b98b8a95
SHA51283047cf29e40704296ed1a89464316eeb1d2d1be850113b283abef0e4a1171a294cef6db557abbb426beff0fe4d2e7df25c7ed510af945d83a989decfb22fda9
-
C:\Users\Admin\AppData\Local\Temp\Xccu.exeFilesize
186KB
MD5f9a366b9b9f9084ad7b6a5af45a34723
SHA1ea09f6ff3dc2fc2e3b66cd9965aa826bd6c40f30
SHA2563e241ff710965c34c366cbc966627d78bea4858c1989dd994ab0f7ce23db6a3c
SHA512363f7ac85a54bd1b878362bb697481396c19f4edd41db51980870752d9b8345afee6b6a454fcb51c2a8dff7045cff9eed64be9829b1bfc87abbe46af58eb0223
-
C:\Users\Admin\AppData\Local\Temp\XgQy.exeFilesize
208KB
MD5152465e9bfbedd3eb807cc0138324fbc
SHA15d0f94a3e804df3054e80a9a076ff3490ec186d9
SHA256408c5e031950075f28600135dc0daf1fe11f2e5fb2caed5124c890c96e323dfd
SHA512042cefe754f029efef21d21fc96fb470151981e6cb16da59e44da31810f856f12782e5dc3506bc057ccda51e5803d0375f595fbe6f2c87b5c5f9881894d942bd
-
C:\Users\Admin\AppData\Local\Temp\XsgE.exeFilesize
204KB
MD506171ad0a0a6e08b09ef5f46c500183d
SHA1e36f940637794d8d118f0cb2e66ad12f3307f2b9
SHA2561c47220041a25015b6a812fbbcd352da29fa18d3a9bd1dc35d8103e14c134540
SHA5128b7e5206505cf6e93d355054554bdfd959776bb9bd06213dc1821cf63eef555db46e0d76ad6408cf40b1dc828916cf030a04a4e508d27e4eae46768b9cccaac0
-
C:\Users\Admin\AppData\Local\Temp\YQQA.exeFilesize
196KB
MD55f6fba04a3ebd6ba0883be958c432bac
SHA1ad291cc7037fec883e9d6eabeb3630c22a39ef13
SHA256a04aa3c8c2ec1be753a241da7622fa59b3565d64f7dfb6a22d06f7815c133990
SHA512a5c263d3744896f4caa68abba76b8fcd48476c109742c201df1d6712a28f99fa47f8a87e0773e752aac16cd4b28536f6f7956be7146b797dde3c9667e4256e21
-
C:\Users\Admin\AppData\Local\Temp\YwMG.exeFilesize
184KB
MD5dbdf0de895748c58b422374c1f1753e6
SHA1c1e8321bb40263e4872267fa202e6138778394f8
SHA256adc8cb6023687b094b732252b02326d2fbd26f6c120fc52fc69e13be602ed838
SHA5121775daab90882225192da2e63b2a551d6cc0139ed59ffdb9566d6447cf62cf1978a6f12c2c31319e4d65210e9665e900a2c9728b9765cab44e9213daad564411
-
C:\Users\Admin\AppData\Local\Temp\ZYMo.exeFilesize
195KB
MD5dfeb6191d8fc14453a4645348f7fcc50
SHA15d3cbc7af35aff52f7e97a270981b076d5d4d971
SHA256e2e9962b55d5ec201d746f39577b1f775642db49bfe53073532bf5235d640372
SHA512858126d84d2bce14d863cb61d154af79a386bf5e03ef826679a5242f8471bced9bae8af22594f4e7c7640372e17f4a0a6546fb92d6bdc1fb28ff65e1dac9d541
-
C:\Users\Admin\AppData\Local\Temp\a2501c3a1063bfbdd36b079fd4b44130_NeikiAnalyticsFilesize
6KB
MD5ef625f28a5fa08948768d1836c3227b1
SHA196a6f727228c1ace18c93c9b6117b0cfe7f66a74
SHA2569074d2d9e945ad6999ea143b7ed0a3d0007ed71c2fd6703253ccbdf5238ed889
SHA5120a72a13de0ad7e0bf32771d0c3c6483f5878bbc39393f671361454775bb01450ecb0a3a4443102fd4f76e26a2de58e720ea705465464ca376a8b517e2cd91635
-
C:\Users\Admin\AppData\Local\Temp\aMcW.exeFilesize
192KB
MD58b2944f65340b7f7dda5020823116ded
SHA11158a3a651aeac822f802b4705fa4be2ba4c4929
SHA256ed98bc55334dd5657fc9b32615c2a21e2c7ca848dae1c1baaaa95afb09ceed1b
SHA5129f889a6c7bea7e561e11641c97b8795927d5f12b396928449045a2aabb4bac3141742a080f586d69a1d89e534ec87cf1ddb592ff4c749498734d4e70af104503
-
C:\Users\Admin\AppData\Local\Temp\akow.exeFilesize
228KB
MD51aadad8c9f3d46a0d4939e6b23f27584
SHA1b9eae1fb386710531fbaeb1e0d51f99915f370ad
SHA256d08e7342bd1e203f8f5f6a5875c037e1818fadc32bcf6b156980195959baa8f9
SHA512fcbf90061ce93f0808c698a4249605399cf1f60c8caa7d19da32b61800ae0b1de7fc43ac4ef14f75240db9a4750186fc53cd102f61eeddfacbafd6a407393bd6
-
C:\Users\Admin\AppData\Local\Temp\bowy.exeFilesize
204KB
MD5800e131c91f8a3da2d7809c92fa7e55b
SHA1ebe46ce092167247712f8e8d69c741dc6e6f1cdd
SHA25679aa77cede45eeb1ad12e56985cd98eaf4aaee63df6e31ef8094cc197d9f787a
SHA51215db72fc41fb5fbe40384d40eeb6420002a59195ab37922b082e08228d232e1d94f354e451727adbfb2a3a5da93289e1975d06677e381ec7d0993565e5e2d09b
-
C:\Users\Admin\AppData\Local\Temp\ccIw.exeFilesize
205KB
MD549415e06d63c4d3b0285389258b1c1a6
SHA165361d0a7be86ec1999fc064326124b496dc61f3
SHA256e62c1c4261624c33d6ae4743838efb7fa1502b1182d7b7f7da0b501ac1196093
SHA51209d7924a9a7ce58470ad4e611cf395ef6da30ce50819ac9c615d8e764ed49d0f5ad861235301cafc49db250ab8100c1b8187ae77351f565ee4f76bae26741856
-
C:\Users\Admin\AppData\Local\Temp\cokQ.exeFilesize
200KB
MD5cd5b5768e1d6e9292e52b012845d8d45
SHA1fafef5e9d93e620569f455072ae1e850d4c83c5b
SHA25640b055c736c3399e2ad4ff78b675435c2ee04efdb7a3ad53be6b841efa666bda
SHA5125498cefe2ad32951a46c5e022f25681b07a6f20d417b7a9a1e3b6f365efc8e55233e93feecfbb3df434fc3a8923c433bb10b87637b4a773a8aca10ad8f352433
-
C:\Users\Admin\AppData\Local\Temp\dMIs.exeFilesize
640KB
MD5d4ac277545cf918371da09d468a309f8
SHA185dfd81527548d7f081e9ed84285adc8937b23e0
SHA256c66e110011993355221fb268388c7dc0b87b7d37b2416ba0928619ce6047fe41
SHA512d70c2759f95264cded8d16cdaeef77317538a19fcd7a7598b43eedcce966208a99167f2a9db3483eda04fda5c2062d277ce193a75bdacfda1147f5685233aa91
-
C:\Users\Admin\AppData\Local\Temp\dMQg.icoFilesize
4KB
MD5ac4b56cc5c5e71c3bb226181418fd891
SHA1e62149df7a7d31a7777cae68822e4d0eaba2199d
SHA256701a17a9ee5c9340bae4f0810f103d1f0ca5c03141e0da826139d5b7397a6fb3
SHA512a8136ef9245c8a03a155d831ed9b9d5b126f160cdf3da3214850305d726d5d511145e0c83b817ca1ac7b10abccb47729624867d48fede0c46da06f4ac50cf998
-
C:\Users\Admin\AppData\Local\Temp\dkIC.exeFilesize
186KB
MD5abee9629cc0fca0442b54ec957faaaad
SHA17ab68803cd277472450b30b56be19e752b129c2b
SHA256e7d5bbd32d2e1deda1aebf74e19f2ea16d8c6b7a88a8881091b881cfbceff02c
SHA5123d7512e48291e4fca8bcd3fd95282a119fc8f7f69c9de6ab725070eb3b2afb88431fd6e71e286bc0919b113fbf420bef4e0d6d6b6490c16ef368ba457443bd79
-
C:\Users\Admin\AppData\Local\Temp\egEO.exeFilesize
196KB
MD59c0774b93450bd240afa16835c981a69
SHA1587e7f0b9296892ad1c8e891ef8627f8e8c3dce1
SHA2560ce1d738f2669033bb47cca3b9a3187839fc144708a5a859eb89a46e21abcb51
SHA512d34f2f4281d18d14d7f8318d17785fb5c3ec12358d0e81614105c2364b180a26a9283fcc03598deeda280777caa5c38d5da6d430dfa08ac3038e07d70f6d7e66
-
C:\Users\Admin\AppData\Local\Temp\ewUW.icoFilesize
4KB
MD5ace522945d3d0ff3b6d96abef56e1427
SHA1d71140c9657fd1b0d6e4ab8484b6cfe544616201
SHA256daa05353be57bb7c4de23a63af8aac3f0c45fba8c1b40acac53e33240fbc25cd
SHA5128e9c55fa909ff0222024218ff334fd6f3115eccc05c7224f8c63aa9e6f765ff4e90c43f26a7d8855a8a3c9b4183bd9919cb854b448c4055e9b98acef1186d83e
-
C:\Users\Admin\AppData\Local\Temp\fEMU.exeFilesize
229KB
MD5199a1316b040a21b38ec674c692da12f
SHA105ca46541852e3945daf3557a4d04723420481fb
SHA2569056b0475b54580d00a62b75df8ea76b5bee0547e477df526ad6f9cea5f4bde1
SHA512286af4482f2d532127e36f74f6e85d3a7bbd34378b399671971956509c391e6cf5f50df72d16f25c62e6f33201c2738e08ad74d62ad8b59209c830b174346822
-
C:\Users\Admin\AppData\Local\Temp\file.vbsFilesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\fkgC.exeFilesize
564KB
MD531354819cf4924adba8e7038abe775c4
SHA10862f09f4a1a89e78380a62ab1c271771c4730c5
SHA256535cdf8d8180cf729dcc4aa98353763effff991774a020c95cab5282634c0e72
SHA51227b22686173ea59652df504a0f2b42980eb64e197fb5821bac5c7d21bc029cc4d685294de8709e2d6038734314d001fc31220511d62643538d7283306b5035cd
-
C:\Users\Admin\AppData\Local\Temp\foAg.exeFilesize
251KB
MD54933b8d1cd0d26a3f154e9475748bd20
SHA1bab65d6e76643447795552485cbd72fa3f60c16b
SHA256c618579a4f1ffae48c20cbf98266a8674bafb553c3327307a7ea3d3b96b781ca
SHA51233115f921f90dd4a9a929c046a6b27580edd1cefd9b8ac7b0688f050330ae42c6443aa375dfcda1293385214770c22756736c0c41593dc8728848ebf04ecab56
-
C:\Users\Admin\AppData\Local\Temp\hEsC.exeFilesize
329KB
MD5104df15b9920ba5adc3c51ac0e8e8392
SHA1debf2b72f966b4efcbcdab211469c4d1418a98ce
SHA256240407bc4ba9cb06c711fafcb7d1c1511c6f08d85ae072ef5c16afb4ded82aa6
SHA51289ad834e6b07603ad70c2c9c4f5e6f4819a0e8f063a64964e505a2a3a04633212085f41ab83be51e1dec8db4b8036139303b2393f5b9e31fade32f9b0a168925
-
C:\Users\Admin\AppData\Local\Temp\hUMM.exeFilesize
192KB
MD52ce465538ac3199fb7b2606753e35bfa
SHA133e469644b27d372937e8b0df2c5a7409032be16
SHA25680b6dee6258a0b0fc7340d49ee5cdf580d99f1fcae91f82715520a1a85c22b17
SHA5127bcfe4a7ce86c80bff136ff4d2eddf67b251ce95943dd932ffd1a36ec0c50829e22964f5992e8b10fffee0a0ac804616798b735d5408f4fa01f0cd2deecd076f
-
C:\Users\Admin\AppData\Local\Temp\iEQQ.exeFilesize
200KB
MD513984f56d2e69a610eb5248ed8fec66e
SHA1c1d6e97bb06a60a5522dc8f71024815128a2fec8
SHA25612d257ef122a48ace9b1d45cba1af256ff8df0c4d17ff82e90d9bb495670e452
SHA512192396fdeee1cd8fb4f2dce227f2ec1f3269f0a3ac68e78b31287886636cc7cef478fcdd4999a953a6e7394387404285f5986f6c06d9966604e19e115b81dbf8
-
C:\Users\Admin\AppData\Local\Temp\iQco.exeFilesize
775KB
MD5a3daf50a3f006bb53d1868313bbafc1c
SHA175c867866440b7d66354459278ae3ba5fe13ccab
SHA256714168e92c1516f019681f69760137932e311f7a0bdf91d5747b532f33069775
SHA5123832ba56239caf9eb9514c68fc21adadee8ed52ece86650177055b21112022e50556976b4a24c0db92354f30d3524c658c9434f04999498626559d30f06c6e72
-
C:\Users\Admin\AppData\Local\Temp\icAm.exeFilesize
645KB
MD5e616bd875b7d8b7c80c491cd1839a5e2
SHA1a0572ebf06bc79800c187270c43eea45f2c74f27
SHA256043bcd9327db40e25ed20a9bf248980b2c03dfc2801f2d5036ee8f9badc14455
SHA5125cec483256f7d5739ede47b723648c519690238bd793f129abf2d2d24231f185d078c9f8b67ac0c42e321d3455c77f9831a00f183fb88ea9a54542be22b5e4d2
-
C:\Users\Admin\AppData\Local\Temp\icom.exeFilesize
649KB
MD5609fe0581d25fd7bfaf4860ddb38c07e
SHA1be2e9af3ab52415457246ed220afe7b5331f1f19
SHA25673ba24eeb4e685b3d2267bb85cd46f32ba8f57611d6d8250df69e47e95fff67d
SHA5124ee03e055018d3fb026a6ae4a88e994a43a7750ad3f90d51ad8e91118065074dfee8d805f1e8956ba240972fc98bc2a2e0e298530e430e800baea6d60b176e24
-
C:\Users\Admin\AppData\Local\Temp\igEA.exeFilesize
191KB
MD568c3efc6b4840411a51275b120fb863a
SHA120ae462eedb094a3fd82ef1d575854d1b84a1277
SHA25649f762c75165d2311b5c3f6530010bb4898078580305e22eda862ad3f8328231
SHA51288adafd80844db87d5deddfa823032c87b57876759e1f2f94ce2add62276904cbb1d0024a6dbf0f688540684e208b66d79413644eb0d0eaf47116b78bf47e8d3
-
C:\Users\Admin\AppData\Local\Temp\isoo.exeFilesize
205KB
MD5f05fbcc657b5779eeced9b4f46c6dbc1
SHA17698feae8ba364f07169271f8b50fa436fad97c5
SHA25612e1dd57ce39727ea151bc1f82cbb136820ae35a1d4d696bec0251652557a6c7
SHA5129e303e14dbe9bb172dccb94eeb7e45ee36ad737d6cd6787f6c5a803e75e0b0e350096f595e79702dee1d0ce2a8f798215bd33fd951fb81cf0d500434d7c06fc0
-
C:\Users\Admin\AppData\Local\Temp\jQsE.exeFilesize
201KB
MD59209cba6ebfd66d99188798fb372f295
SHA1ee9b195eb5c1594e5663d4a2a6eff0c15183febe
SHA256cfe5c7154e0c49fb8698a5a10282662e21b1d2a1f3fa232ea3fc7eeec42015e2
SHA512c688e5fdc59e0d861596860c8614fb5720d97fb852ad9c6829b2fb462b96c43ac0a11770ad07ad483940951eb8ca8d5bf3428bba425d7d70bb8d390761b8f94d
-
C:\Users\Admin\AppData\Local\Temp\jscg.exeFilesize
634KB
MD5838ea27a7f01b1d253d24693cceaf4e4
SHA16a3dbbd78b3d814bb11a010fb9545195471de6b3
SHA25661badfd33f23f15b9793a836fc837e500dfc1cc56721a28710e64f11caf02bcb
SHA51207048e0c98bdb91c6f076ac5c053f7bb8131ea9b14defb6e61392f7d4496987010d2602111ac38b4d053f2bbffee82e231d0cbec43680180dbeffe59c53ea2fb
-
C:\Users\Admin\AppData\Local\Temp\kEAu.exeFilesize
188KB
MD5a8bb8e5f60f1b92448c3fe0a0eb9f054
SHA16d1fb437f0c204965090119f17af9c513bdc171c
SHA256edf8ecaee52f609275bf499a00ecd5abcccbe9d4664588f4d407ece01c33a69a
SHA51243d149fd719ec795882b12f5ffb0967355db52d784d26de2407b9bca5c9de6349b9a6a32a2b8f63d64af853c5f4b05e326187983ae3dc800d30c756d508aba7d
-
C:\Users\Admin\AppData\Local\Temp\lkUA.exeFilesize
192KB
MD5ce69b4954106866df68012558ff146b2
SHA1b319bc7e07beb7e96379f1d643624b08ccb2226e
SHA2563b0002331d47d95704ede8ef7524f6317f4e1eb319d6aee9f947bf4bfb93f720
SHA512044f10ce5a561570421a96a80b595c0fcb0c51a066d176db541587a304ba222141febdf27e402ac76bc90b2a5b8f6ac378d32f5149a8dc1eb5cee29be176b1db
-
C:\Users\Admin\AppData\Local\Temp\mgwE.exeFilesize
201KB
MD51f405e30971241f172a3343f954f0954
SHA11f72a2bc5f4b74e36dd5308c276d9db3cf94194a
SHA256f4a51a3e2843c01bdce0974c9a4078a43d51a01645117a04f3a57f44e52d24c4
SHA512391e2e2945061b240c9352886f59a92d783e2686692cbb410bb3436d7d6a6fde1508e716fbbe8c6065957035fca091c8d7582f4dc73874a0938d443bdd3b2844
-
C:\Users\Admin\AppData\Local\Temp\mksA.exeFilesize
678KB
MD55c2d92abcf0ab7cab8cb53c16412393b
SHA1e5c9f5865e0d51d0374856360661281f174e3fd2
SHA256829c01bfd32f11efa1d008b46ff967bd9ce280fbbc78b833d99716fa6eec42e8
SHA512ce1e2244c307930970c6df123937f2cb9ff3b2edf768b2609a74f036cb06c7376312406f5581cabeee6cf160bf65f0bcf7d6127317238ed02a0766ab135b2483
-
C:\Users\Admin\AppData\Local\Temp\ngUG.exeFilesize
198KB
MD5709ef70bbc8787c32847830bafbfe912
SHA12d0035b8330d05e90e8fcd92a22dcaeb189e0c65
SHA25622727045345f012588909b17a3977557cd30dfb61774ca746a8c9b3b12ebda2b
SHA5128852828a4b2dd10b14ed84f01fae016ff2fb8aa82e22dafd6dfff1d9d7958c10059720a5b1d55a29fddf9ab4a4d33e1aa982249ff5fb74d6164a6b4f496773b4
-
C:\Users\Admin\AppData\Local\Temp\oMsE.exeFilesize
794KB
MD51d871556a785e6f6c8f1736407088b67
SHA1ac04b4552ef652f5e5d9f038a4f34593a14ea8c7
SHA25685ed3e04890a47207dab5dac3b80fbe4d4b1d446965b3614838c4bb89657be60
SHA512d635491873b12f6586a356c369bcce7fbcfeab7c488b11b8a93792630c5aa7327683f4fb04477ae1454e77b62fe349bff4cc1aab1d26ea0534cd706b47350999
-
C:\Users\Admin\AppData\Local\Temp\oQwy.exeFilesize
186KB
MD5c5c9416161e85dae2cf7095bb40a6594
SHA1515f9cd2d4008aef0bf2048ff993dafa98d14e5d
SHA25699a270eb9566c748d9d1442099d44fcded027342fb5946317dcf21717e7f0210
SHA512ebd266a690e910277e3b1ed97de942d349d8ee6ed85efaafda74ba705014a810bff5c633e969121caf9c883c8e2d09bbf00cc4c83bac9c162ee87d3c47ba41c0
-
C:\Users\Admin\AppData\Local\Temp\ogYE.exeFilesize
207KB
MD5304b27483740ded7a71872c142b89a9f
SHA141bfc66727c81e7e38617b81feef179eefc8e62c
SHA256bb220b90ca978a744a020b641b35c428ef579296d0e57072fb40b88dc9b5e60f
SHA512a6befd813b5e7b265fa15c470e2eafd6c07e499b81fc5c2ea9bca60f9b837712644c18fd55a14f77405330c9214ffa3dd2e25244164ceaed73e4ee34d1bc188f
-
C:\Users\Admin\AppData\Local\Temp\osQE.exeFilesize
313KB
MD5d07de26e06937d002f2158176f1651ba
SHA17a37787297a7a903370af8989eeec71960bb037f
SHA25626cccaa81c5ba09b779afc726d2945809e929dd138794f4928a0e6eb80db639a
SHA512ce1d4b050bdb155c931b62e029f6f003d15c3d04e07021355d1ff628d1a46f43ee8ce6bae2710de603e88e525d4c09ed8771d3ffd99821cc71ec88449ea13f79
-
C:\Users\Admin\AppData\Local\Temp\pAMW.exeFilesize
199KB
MD5daa0193ffb53322773638c2b7dcf033e
SHA1200b0602de7fd91a2d471924e1e8c045dcf688ea
SHA256ca153790a5422382687f64aa5a71ca54d34b8cb64611a944bce8308dec1145cb
SHA51256e6f09c0e601b7f6056eb941649456887e878f0f42cd1b6a18d492d3fd397bd72723aad2cb5f07393ee03f3632da3df5d27f93d8b2c0a92e92f8f3bb6792bb2
-
C:\Users\Admin\AppData\Local\Temp\pIki.exeFilesize
195KB
MD5a1daf179ff134e4c1691fcec3c1ec258
SHA11b741fffc3d072f33e8a54bd2a9d2277d50b800c
SHA2565a53bf226324eea097196b48e7de3996c29b3486c90dc9ba274423771fa7e5c5
SHA5121d97eb6447b7a27e407ac71facdb16580e058c5c252af562d87baec95ba20857a8f5ddc9e4b05c27b45b202000e862d910f94509d1b63ebf377b88bfb49fb752
-
C:\Users\Admin\AppData\Local\Temp\pUEo.exeFilesize
192KB
MD501d0f78c2042e2ff39085e58b6cfde51
SHA14422a6e80096ff9563d4f4e89b7c05eab64ec814
SHA256a355e33a8b8f3119016a76792f0bc7c9b8da737caf57e7c575ae2e9a64da398d
SHA51246d0bb0719b4a6b297c3535a1d5213b24c724fcdd576cfb559d54782d1e9f10d09a8ae1a396d929126faddaab9673875d2712c397d3740a9ea70037702628b4c
-
C:\Users\Admin\AppData\Local\Temp\pUMQ.exeFilesize
232KB
MD5f1a1c05172e18a2aa247f84d3607cec4
SHA1a748e5130fe3ecc01eba6084a00489fe1e1a2cb4
SHA256274cce6d776d378b8e96f0546f2eda0c07f2ab2ab378986d22ba9cc53fe8700c
SHA5122f92543569dd3b94d816dddb4876f5bc6c87c310192dc96b59ce8344be3dedf2dfc56b71824d76ef7bab31e7f758169d1f8ab2c62017f59ca478bca3503c39dc
-
C:\Users\Admin\AppData\Local\Temp\pgAM.exeFilesize
192KB
MD562087c697ec3d1728ac04e1cec14c89f
SHA1beebdcbc7a7629b7eb84fda340c685a97e05d9d1
SHA2563636812be7f1f90ac363814e9a7c1abf3528f7fd082b69f58d63c35198067244
SHA5128c4976f63b9f060a6541614f7445ebca4be64dc39d4b75d10a7b4cee5e739dc9d1a1f87228e38f0a992deb9e4335615812a15b0b30426e7b76ff4bf1c3279a39
-
C:\Users\Admin\AppData\Local\Temp\pswQ.exeFilesize
814KB
MD59c0dc891b51d8a0fa43d3799f02b9ac6
SHA12bbbfcd47db34b55e0060eb5183698df76307781
SHA2566dc920a2b2de4bcde56bacdfb4f71202e0484cb33d275388cc01f8a6d3b586bc
SHA5125ab3feb14eda5da62383d8320cc50184ec80bd7932a7fcc3bbd698fad6d029ac0f5985f6966df63630aff5c649c437e679d82802668017c26e97828ce650d0b7
-
C:\Users\Admin\AppData\Local\Temp\sMAi.exeFilesize
184KB
MD571668891035cc411ff69eae0a63038e1
SHA1d067c2c2a197666014df2ac90265393927aa55eb
SHA2566de2ea8d096e7a1d76904d7ce15d87b1eb45fb961ca226b81dd3d91b569461d1
SHA512eeac2d043ad3ce311a6de9962e3c32c2bec710b625b5ff8eb095a1ba33243d9e884a5f5b716decb06cf81109b66112ca1255fc0d9395af73681d4b3a9681e514
-
C:\Users\Admin\AppData\Local\Temp\tUcc.exeFilesize
190KB
MD50ecbad15fb2e116549fcf6624f01d92e
SHA1ad6bd78a5b584a805463dd52ba5e4aec86a8e67f
SHA256c527db81382d05988ab3f1d5e9628990e8605fb6b99329f6267b127468bad14a
SHA512bc879b051857bf9676b1319790016cf0e44e7dd93edd6d041355c103594c93359426687f94290f5a64051d631f3e644f86fab36d0a4e526c88964e8024a18d31
-
C:\Users\Admin\AppData\Local\Temp\tYwY.exeFilesize
813KB
MD52baebd6c7599a75a79d6e535cfdf62c6
SHA17276519c203211e5390b5b18b58ee00d6edf0c6c
SHA256015029d36877207ebf4b1764eb1ffc971c821687c2eb0a58f41df684ec67f38a
SHA512e6c484459f4848f3d02a3928ed562074abed141a290f4729b0884ed730be770547992ca500a83fdb0d5c625890d554193b80452bcc885a402e2f6b72c5ce8501
-
C:\Users\Admin\AppData\Local\Temp\tgEw.exeFilesize
190KB
MD581289d49479e5755a228a0a32e8919f4
SHA14216e44fa93565def833ef09a543428d53c1b8b0
SHA2564c457840453216abcac821644a82a3b70c0b3aed3eacb440df9c3e6bca6d774f
SHA512fa422c641443790de303b21586a6206f9a65049f7b24cd115e2b30ef66ee930388a3d7c52db01bcfb3ade8b431de0ef859f0784361a68ee2c11dba03c147001a
-
C:\Users\Admin\AppData\Local\Temp\tskA.exeFilesize
5.9MB
MD5800e29f24001a2d92649c875a5c27792
SHA1fa10df9e8e631b827ada38f54014c1088ebe88c6
SHA256276db61cd8c7cb36c10811d2d1fb72bcc167bb3c16c664d42a83e5d61c6a84d1
SHA512daded41e41816de20837f13bf7de0627bf6530ac102060b5d807e7cc9edbf2d603318f86fbf9189f1dad7bbfc44d4a08c0c608eb5a50216be2a4c050463866e6
-
C:\Users\Admin\AppData\Local\Temp\uMIM.exeFilesize
196KB
MD5a010642d42caab5429241525fb734de4
SHA1c78d17463488ae22eef062e52d80f601c9526aa8
SHA2560f2a6555162e1b6d970acadf4d87e955d1a3931cf7c9481d3b80a4b76e88ab92
SHA51248cfd3a7922dbe969f16de232120d59ea5d56700af6144f435d6fd1d4c6d6373beeca554c52f3b7df198b289e236022961152cfdf0e01f6c41429e0aab9b140f
-
C:\Users\Admin\AppData\Local\Temp\uwke.exeFilesize
203KB
MD5506c1f81817b3c9122a66a9d587d4805
SHA18727b02039d1c523054e7c89fc89de16308698b4
SHA25693629a959ac681584966f7ad5e80fa27f52de763843d3f064169780f31d30928
SHA512b9fa4babc088f424c2d5f28bbad0eb9282072d1f94c9a89d829b6a08f5fb4f5fcf663dae7561354ae8e7004985e5a1924c9de13fe0c86e8bfe7fe9ccea4d23b4
-
C:\Users\Admin\AppData\Local\Temp\vIsi.exeFilesize
984KB
MD5dbfe4cf192690de36069375d820ab4cc
SHA1faa8a935177fe1d745c5803ce6346d122c5f3675
SHA25625d0a1f39083d17b821927b0e3f86273d768261d7d5e73e6cb2c15750a41d7c1
SHA512c407b219b205f5936165a37a59fb8a60d483e84b911a7452395dd82d4452dae17d5fe003246977b5d60da034986f384ea36a81893e4fa4724ecb8ddcc034dbee
-
C:\Users\Admin\AppData\Local\Temp\vcAS.icoFilesize
4KB
MD57c132d99dba688b1140f4fc32383b6f4
SHA110e032edd1fdaf75133584bd874ab94f9e3708f4
SHA256991cf545088a00dd8a9710a6825444a4b045f3c1bf75822aeff058f2f37d9191
SHA5124d00fa636f0e8218a3b590180d33d71587b4683b0b26cd98600dcb39261e87946e2d7bdcfbcd5d2a5f4c50a4c05cd8cf8ac90071ecd80e5e0f3230674320d71c
-
C:\Users\Admin\AppData\Local\Temp\vcMK.exeFilesize
796KB
MD557e8800f306b493bc50f0fb30e5e562a
SHA1f19c3b77f2fc31bf10ac0e73e0d3c4b5c16dfe81
SHA25669461afa50b4fcc9ac3484bde5c8a0b12d0fceae7dfb85217da5d6f9e9b4c918
SHA512c0fc953519fbe58096ad7f95f478fb2014fd303ba637808bbe40b469503d8cd1a593d243b0a866ae0a1a1ab7cffa8cf50fb86828783a17da2f433f04205b53d1
-
C:\Users\Admin\AppData\Local\Temp\voAu.icoFilesize
4KB
MD5ee421bd295eb1a0d8c54f8586ccb18fa
SHA1bc06850f3112289fce374241f7e9aff0a70ecb2f
SHA25657e72b9591e318a17feb74efa1262e9222814ad872437094734295700f669563
SHA512dfd36dff3742f39858e4a3e781e756f6d8480caa33b715ad1a8293f6ef436cdc84c3d26428230cdac8651c1ee7947b0e5bb3ac1e32c0b7bbb2bfed81375b5897
-
C:\Users\Admin\AppData\Local\Temp\vwoM.exeFilesize
393KB
MD5bfce0f83994f6000f0c27a4b53002c13
SHA1a114f37d7726e397af01a45718e5dcdd49231b06
SHA256f87fc73b6d400454f56503285ed222fac9887957468b4f522581a767049ffc20
SHA51299cd5f3297da1d5c79995befde278131e0610a3344e4b4fc9d0167094fc1f8b66f757d62c54b91c46e40ecee06b0563308e85351808d9a9cc66045a487970fb3
-
C:\Users\Admin\AppData\Local\Temp\wMww.exeFilesize
213KB
MD515fa868946d7fbd53ded5f70f3cb2a75
SHA1f71757e013b6170eb7e8d30ffffdb590c679da28
SHA256ee1fbb255375b1ac9dd93342239f29546412f518fbabca41e270d9ed2ba74bde
SHA5124e6753140bf62483661ae5ce750af5f0d09a88c3cc342d1cc170dc39e6583be353be24bded5ae2fc35121c4f24c1fdb406a239bea182d22cf4f90187c70b9912
-
C:\Users\Admin\AppData\Local\Temp\wQYu.exeFilesize
192KB
MD5e3e4c2dd41b46ca242635ee39b632a88
SHA184cf084b05dbc83af40770596a335f81e327b764
SHA2569e64785425a80e34b21b89ade4c1b0c65d0bc95f0adfe7c98bcf9bc018e6febb
SHA512b42cdeee2626959a51c8e00b6d235d2760b2d3a53cc605957fdb3ec3e3fd5c8529dfc7b2f3eaaaa7507a77f8a5fee3b0f8c0ad4d1431bd513a1663f80473c065
-
C:\Users\Admin\AppData\Local\Temp\wwck.exeFilesize
209KB
MD5afe98e50037137d1da538ad577de819b
SHA14a53a78a3d3816bfdb1fff2446aaf94f16e167f4
SHA256e5c80d1fb2e9486d46371d066b03b24da3f6a450d27f7b3da47f6b652f50a12c
SHA512552de2fb68792707395da2ebd833b3ce9fdbe45403a0f99f81734d6920724e5d8a4cd09b474d6a51d1be5dc84660ddb3c653601ff02b30082d7bb22ff9cbfd8e
-
C:\Users\Admin\AppData\Local\Temp\xMUS.exeFilesize
769KB
MD5c6dd6cf1686d098e1e97679c4483b957
SHA1fa02c71339edae7bdc89a35243f415655010ee20
SHA2566492065307123ed1f7c0831ffaf04349200c028a5c26f421f6af9a9a5e5f50d6
SHA512e1b0bd1e27b381ae991595ceef20243475d02df32fb218bf3e27c8afde98ebb148dcc4ba35553b29468ed1f5cf9fb2940443b5f6124a8dbecd1bd4186c296da9
-
C:\Users\Admin\AppData\Local\Temp\xskw.exeFilesize
196KB
MD5ad2de6a3c6dff36bb6efb4cb3293c454
SHA1e2c137b2a2f8101b06e226529f840ea722a52ddc
SHA256d45c2a697889124b2f57bc99ee61239b9672c85922adec2bdbcfb13e971ebf6d
SHA51207abf11384b78c1f1a7e2f7ce5555b6e016654606eb7e8fe931c95433bdc1e7bfe3ea35e36be681541df05033909789149ed187afca2c569457ffc0ee3a0adfa
-
C:\Users\Admin\AppData\Local\Temp\yUIe.exeFilesize
181KB
MD5c9416faaf389f7554575498a9da2ad27
SHA1cf2dbd14c18b1e2b111a4be1f934bef91ec0729c
SHA2564a6d774c51b6f5b30050a8736353baa8d65dc65419bdec7c7a6879000219f8d3
SHA5128880b33e91691f7d8a8157e74967c1fe2019a0cd5e4ef2329e2311769e80cb0394049daf0eacf6a025bd09067bf7dedee529cb719d6d4c01ef1cd9b5a4a3ad37
-
C:\Users\Admin\AppData\Local\Temp\zoYq.exeFilesize
733KB
MD5d6bb6a51a1920355f2cac370d3470dea
SHA1fbd02b4f5040286d767563a8df72c674e6b3b67f
SHA25617c48f6a2c22888575273abe3f5c7d5662f385812eb1678d0b87c7cac6b0c2d4
SHA5126a7ccd672ffbc545b22e7fafc602ba46e68b3552d32eff73f8594d2944c1e135ac6161a8e93589a7519f95834e614826088b00ef9d98a959975e31100fc13156
-
C:\Users\Admin\AppData\Roaming\OpenRename.bmp.exeFilesize
525KB
MD527d314f5378a7cc14b901f3e73be0a5c
SHA131706fcb8029b0c33b2dc2570d4eba3e507d99e1
SHA256778e33299c373b2fbccd9f8ecc381eb0874c28f1409a1cc7b6aa643554ba060b
SHA5121981464bbd49f18b4b3087fcac42ba5b018a9a1b27457fc83818bedf4cdd56992a7fdaf159a876c7e96bbca58597656b96e2886705a993c82cc08a2f6fe1ea41
-
C:\Users\Admin\AppData\Roaming\UnprotectImport.gif.exeFilesize
620KB
MD5ddfcb7cf3ec055cac4593b1d6d2144d6
SHA1ae591058120cf925cf30c4ee3019ba1bf78ef727
SHA256e7dad64a3f8be38330aea3a79ad06f566245e17b66507c3215fdebee47ae7de7
SHA5124821eaa60148b5d53a08aa2b4a0dc7080f4950b6c680c35078f5aeca87c70e1fcfac90f3502b65a008332ad58100cd9e674155d71f0b0ae05a131945b6f54bf9
-
C:\Users\Admin\Documents\SplitDisable.pdf.exeFilesize
1.0MB
MD5e36f2885c76801fd39250a8029983c77
SHA18b53641e7f6f817644bb534b6ffc50349008c48e
SHA256b1ba37faa8d6d222535503c58990695413547e159582ce409c8551cf70c647c7
SHA51294b2c76ab94fac8727d2472da88d9028d606d765e82356355fe40a006c976b78bf864aa0c89eb6e1087ae0fa979eda74c6ad1afeb876316ee39f207dfbcf4d43
-
C:\Users\Admin\Music\PopCheckpoint.ppt.exeFilesize
623KB
MD556f7d84469ee064776abd6ebc3282286
SHA14114f82294a57f6be3c0cc56f0fd2a7e5a98491e
SHA2568e6fb3b5304da9ebf967c8e89572f8a195d674a950f16b206ec914aa04dace7c
SHA512766f745fb5bb2bd410fbe8721df7e33a1cea04316b6b50beb95195d981f6a7df2dac2780a7a1a6e2124864705f5c68334b290ce2f826a3a6c340f8427d33f35f
-
C:\Users\Admin\Music\WriteRestore.doc.exeFilesize
493KB
MD5fc14f1374c41337e74a576ae131d8ff7
SHA15815b8040c6a436d4c55053a197f3059e36b38ad
SHA25691e29141c75fe9a5ad28c9b674f5d71569ff9f3ee394fbdce53ea2a6fe162c74
SHA5128989e3a8e5d67e6cbffcea54816c5262be4b759c2c8dde9c0107015c679a9df83224311d36ef6e2f31ffc051c2917c090396ee18f72af3803fa3d8aa20b56041
-
C:\Users\Admin\Pictures\CompleteUnregister.jpg.exeFilesize
821KB
MD575add25c7e0274d773a8a2b2b943dc2d
SHA10e77a6f40a5662e3bc3b0a2e52f4c465f85f6156
SHA256fa607c602e8d917519fb866415cca931f2cebd8dd5df7d0f8ece82f00c92b049
SHA512503fa374419a6b10f04dcc5a20e1bd9decb636b1ad488e022d98ba12be8a91d0cd4dc03364a68111926d42d2ec5277a5a1af9c0f8c54a72fa6717feb30a13d6b
-
C:\Users\Admin\Pictures\JoinConvertTo.jpg.exeFilesize
1.3MB
MD50b2b071c32bca06b281b8633f639352e
SHA10f05fb202fd829f99b27d44a479cd8caade6bfbc
SHA25634afea3e2445cf11d497e63a3039f4c17a902cbc86a462362b4d7ecb7996ce9c
SHA51207c6c1e4971bfa661c8db51af099903380222c6dc021f7f680354dab5ea0361f24fcca72b2777256c13914c54412e6d607e403fc355c317998cd49d201676c80
-
C:\Users\Admin\Pictures\OutUse.jpg.exeFilesize
734KB
MD5a4aced178d1a5583c39bb2630610a8f0
SHA18af77923361f4480f66b2a4aa4ca59c27ac99f6d
SHA2561ea46d1bcfa61428a0401cc7adb3ea78ed7597ac4669ddc4bac5544da838d2cb
SHA51221a2cd1a279dd1adb5754cfc0fea7e301649adb5634bf17182444d74822594ed6a5ba201eec8e8af9c55ff746f4d1fb64d66f02374f422e2e322398f01b4cf66
-
C:\Users\Admin\Pictures\RenameDisable.bmp.exeFilesize
757KB
MD576c5e4d2e31f0339e6aa429ea89f8e04
SHA148e9cd23eeb6b25d8e2fc6e3eaa8518300bd92d9
SHA256e80b33bd430bf02c1794b25ee0b6c49c7678b0260189c21945a040099d6eb6d0
SHA5120e3d45b29c11e3c42592a98af4b03b003d4cbfbefba52a367344965074a92fe6b0809e5c801fc1e904e9a229ee7b42b74c7ab40ed2b3e971f0c6c92a55e4a600
-
C:\Users\Admin\Pictures\RenamePing.png.exeFilesize
896KB
MD5c18c9790e8e7a319989c09a0be599b00
SHA17826119a86ab6af627fe7eb5a8397bc733ee1760
SHA256776b3f6c6e7272309c9a2bbe68049086a2722793f68a0fd6abe213276bb4f505
SHA51279d01ece05f154f1ca750b0526edf5d713b4b8facf38490df49f1514cff85d730d07b2787d6a8ab0b3024c4938e4009538a6d752d6b73f684b166b27a785ea66
-
C:\Users\Admin\bUswIkEs\BcoYogMM.exeFilesize
185KB
MD5fd26ebf4f71690bd5501ee80448e933e
SHA130c38e35ee939981d488ecb13b83c56f299c6a6a
SHA256b9dcdc5d24a3fc1d14247e7d1864dfd8b5d27b01927a2a96ec5cde83da68199b
SHA512dcce67581a0ce0bf0d748ba337acbae342fd0622f47ecf804951ccfa5743e8fd7cee7c0fda45abe86cf14fc9d0cb9cb40924238eb3a0cc04436f2a2fbfd69d35
-
C:\Users\Admin\bUswIkEs\BcoYogMM.infFilesize
4B
MD5b65c3a61cf26816fd4e3bb2d389969f4
SHA1fcd5a5c27e8515d0760d1b11bea5d3e1b754fed8
SHA2561129b394f1d56c9165b89458bf2c27e36ef8093a19dcdcaa03b8fdf325214e4c
SHA512aad1f5ad6b4b52ec506836d51a786a1b3c0e99446982e3c9093052bc5d51e77533e7b5f44175b06d54a4f66ee0d8f058078de5399e43d929e6abc326168fb8c3
-
C:\Windows\SysWOW64\shell32.dll.exeFilesize
5.9MB
MD5b802e4f0b057df79a748e63622562847
SHA12dec83001c41da65c33d5628cb989a5e04a86547
SHA2564d8695486e92e7e5818b3c70c5e0f9a8ea8a7ae1b5238061b0fb10efa94cc489
SHA51254f631ff508bef79d9f891e495c62dddf792ec2709ef81b0c4561916f0421983a2d3f6e218b3c2a194d0698e28e1a7afd5df722a91aef4e1c56ddc50c1061b38
-
C:\Windows\SysWOW64\shell32.dll.exeFilesize
896KB
MD58894d3dcb085f35becf36ebe5cbfae60
SHA170825ff08f2858ece8dc0569bbfbccae736d5ffd
SHA256ec5fa73b69a77450f5cd0024cf4c6479f4de4e190e3db6ba713f811900aad8fc
SHA512a0390f4225b2a05d4a5401d8dcd289afbd4685e8669ef3378d359e4264674b8bc13c7b4b78d1e0c42e875cec561f2a04cc0e5ca0526b7410d4e1d600969d1ed2
-
C:\Windows\SysWOW64\shell32.dll.exeFilesize
5.9MB
MD5cb3e8b80ab94adc8b80fe4f43dbbddfe
SHA1e85d4241554f2baae879cef01dd35e4e8442f7ad
SHA256a71b07677978ab7afd65259c968558014d403e4a2e145ff3e82210a92593d3eb
SHA5127170c27289f1755ea853db2ded617534fecf30bff4ae17b543edbb4f5c3a638fbfc7a6f040800749f6df640c49320e4cd21211f2bd853d59ef9473b357282d1f
-
memory/220-15-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/396-567-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/396-560-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/512-416-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/512-408-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/532-501-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/532-509-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/640-436-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/640-426-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/688-257-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/688-242-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/764-230-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/764-215-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/916-311-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1108-400-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1108-407-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1120-294-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1120-281-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1388-464-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1388-455-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1400-380-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1400-143-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1400-127-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1400-387-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1448-275-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1516-530-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1516-518-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1580-444-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1660-396-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1660-388-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1712-492-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1900-266-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1964-473-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1964-465-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2008-218-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2008-202-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2292-71-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2292-53-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2312-378-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2572-500-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2668-529-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2668-539-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2852-188-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2852-206-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2908-359-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2908-351-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2980-177-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2980-192-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3012-0-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3012-19-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3060-319-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3060-308-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3452-339-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3452-327-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3504-33-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3528-29-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3528-45-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3624-131-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3624-115-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3668-79-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3668-94-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3868-417-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3868-425-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3940-156-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3940-139-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3944-521-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3944-510-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4036-119-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4052-368-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4052-360-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4072-475-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4072-482-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4164-284-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4164-271-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4252-302-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4268-83-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4268-68-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4408-558-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4408-107-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4408-548-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4412-547-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4412-535-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4500-164-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4500-180-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4524-246-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4524-227-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4528-41-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4528-57-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4528-168-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4628-341-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4628-349-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4640-453-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4640-445-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4640-322-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4640-331-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/5040-12-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB