Analysis
-
max time kernel
11s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 01:54
Behavioral task
behavioral1
Sample
9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe
-
Size
1.2MB
-
MD5
9d62d1a542c3e3cf884a28d32d949220
-
SHA1
bc928e39f303ff92040d00c915dfa4ebb7dcbf8e
-
SHA256
9780a3957ef9abdafb54dc9716a80329c66be4517fe697b5b3c496b665c37e42
-
SHA512
5e43c68f5e5565db0b5fd45be2e80b5c0c90d5eb8eef0a4fec939d71e1696a8dab74085ba833b4ccac7d133c95281bbbedfe28a2197c709db933ddf2a53a295f
-
SSDEEP
24576:Yo8meJkkpoNDHfBAHTld/GG8EebFp2U1OY0qJAOlFF+AnTlPQJ:X8m8oV8fbtUphjdhlbBnBPg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3700-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0007000000023479-5.dat upx behavioral2/memory/2764-13-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4044-147-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1636-146-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4332-168-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4580-169-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2696-170-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1948-171-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1912-190-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4428-191-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3652-193-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3768-192-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/984-195-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3700-194-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1256-198-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4568-201-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4044-200-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1636-199-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4296-197-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2764-196-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4332-203-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4580-219-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3548-218-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2716-217-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2224-216-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3552-215-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1892-214-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4072-213-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4452-212-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3740-211-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4608-210-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2504-209-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4912-208-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1316-207-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1176-206-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2268-205-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3824-204-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5264-222-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2696-221-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5312-225-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5304-224-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1948-223-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4428-228-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5432-230-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5380-229-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5368-227-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1912-226-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3652-233-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5540-239-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3824-243-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5708-259-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3548-258-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2716-257-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5756-260-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2224-256-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3552-255-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1892-254-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4072-253-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2308-252-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4452-251-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3740-250-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4608-249-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2504-248-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\B: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\N: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\O: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\P: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\Q: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\S: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\I: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\R: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\W: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\X: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\K: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\L: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\M: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\U: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\Y: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\Z: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\E: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\G: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\H: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\J: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\T: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File opened (read-only) \??\V: 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\FxsTmp\american animal horse public ash femdom .rar.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\SysWOW64\FxsTmp\nude sleeping lady .avi.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\SysWOW64\config\systemprofile\british kicking nude [milf] wifey .rar.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\SysWOW64\IME\SHARED\bukkake lesbian full movie ash .mpeg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\canadian hardcore horse catfight nipples swallow (Janette,Kathrin).mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\german cum licking .mpeg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\tyrkish blowjob horse public legs upskirt (Ashley).mpeg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\SysWOW64\IME\SHARED\japanese handjob beast several models girly .zip.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\canadian animal sperm lesbian (Janette).mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\SysWOW64\config\systemprofile\chinese blowjob hardcore sleeping .mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\System32\DriverStore\Temp\hardcore hardcore public .mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\black gay hardcore girls feet mature .mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\spanish horse lingerie [bangbus] .zip.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files (x86)\Microsoft\Temp\animal [milf] feet .zip.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\lesbian beastiality [bangbus] mature .rar.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files (x86)\Google\Temp\gay hardcore lesbian legs upskirt .rar.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files (x86)\Google\Update\Download\horse uncut (Curtney).zip.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files\dotnet\shared\indian beastiality blowjob voyeur (Janette).avi.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\french lesbian licking .mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\spanish fetish sleeping legs 40+ .avi.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\danish cum horse hot (!) boobs (Sandy,Samantha).mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files\Microsoft Office\Updates\Download\handjob horse uncut legs sm .mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\brasilian porn fucking hidden boobs hairy .mpeg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files (x86)\Microsoft\Temp\EUB476.tmp\hardcore girls .mpeg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files\Microsoft Office\root\Templates\cum [free] legs (Sonja,Britney).mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\trambling licking (Samantha).mpeg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\cum uncut (Gina).avi.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\canadian xxx girls shoes (Christine,Jade).mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files\Common Files\microsoft shared\british sperm handjob [free] feet (Christine).mpeg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\danish fucking fetish public cock (Christine,Sandy).rar.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\tyrkish handjob horse [free] leather .mpeg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe -
Drops file in Windows directory 28 IoCs
description ioc Process File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\canadian nude several models boobs mistress .rar.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\beast beastiality several models ash (Samantha).zip.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\InputMethod\SHARED\tyrkish horse uncut balls .zip.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\nude [free] black hairunshaved .zip.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\american xxx masturbation (Sandy).zip.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\russian fucking full movie cock femdom .avi.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\assembly\temp\action fetish hidden lady (Janette,Jenna).rar.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\fetish sleeping hairy .rar.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\russian horse horse sleeping wifey .mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\mssrv.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\security\templates\fetish voyeur wifey (Jade,Curtney).avi.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\fucking action public balls .rar.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\french fucking [bangbus] mistress .avi.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\black trambling public bedroom .rar.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\brasilian xxx masturbation hole sm (Karin,Anniston).avi.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\russian fetish gay masturbation shower .zip.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\Downloaded Program Files\asian lesbian sleeping .mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\tyrkish kicking bukkake licking mature .mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\assembly\tmp\spanish gay lesbian glans YEâPSè& .zip.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\tyrkish bukkake lesbian titts castration .avi.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\british beast uncut pregnant (Sylvia,Anniston).mpeg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\japanese cumshot fetish girls titts .mpeg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\french fetish sleeping .rar.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\CbsTemp\beastiality voyeur femdom .mpeg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\swedish handjob gay [bangbus] .mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\PLA\Templates\italian cumshot sperm hot (!) lady .rar.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\SoftwareDistribution\Download\chinese horse xxx [milf] .mpg.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\norwegian porn [bangbus] swallow (Christine,Christine).zip.exe 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 1636 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 1636 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 4044 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 4044 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 4332 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 4332 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 4580 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 4580 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 2696 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 2696 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 1948 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 1948 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 1636 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 1636 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 4044 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 4044 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 1912 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 1912 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 4428 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 4428 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 3768 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 3768 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 3652 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 3652 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 1636 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 1636 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 4332 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 4332 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3700 wrote to memory of 2764 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 86 PID 3700 wrote to memory of 2764 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 86 PID 3700 wrote to memory of 2764 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 86 PID 3700 wrote to memory of 1636 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 91 PID 3700 wrote to memory of 1636 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 91 PID 3700 wrote to memory of 1636 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 91 PID 2764 wrote to memory of 4044 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 92 PID 2764 wrote to memory of 4044 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 92 PID 2764 wrote to memory of 4044 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 92 PID 3700 wrote to memory of 4332 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 93 PID 3700 wrote to memory of 4332 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 93 PID 3700 wrote to memory of 4332 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 93 PID 2764 wrote to memory of 4580 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 94 PID 2764 wrote to memory of 4580 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 94 PID 2764 wrote to memory of 4580 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 94 PID 1636 wrote to memory of 2696 1636 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 95 PID 1636 wrote to memory of 2696 1636 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 95 PID 1636 wrote to memory of 2696 1636 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 95 PID 4044 wrote to memory of 1948 4044 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 96 PID 4044 wrote to memory of 1948 4044 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 96 PID 4044 wrote to memory of 1948 4044 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 96 PID 3700 wrote to memory of 1912 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 98 PID 3700 wrote to memory of 1912 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 98 PID 3700 wrote to memory of 1912 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 98 PID 4332 wrote to memory of 4428 4332 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 99 PID 4332 wrote to memory of 4428 4332 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 99 PID 4332 wrote to memory of 4428 4332 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 99 PID 1636 wrote to memory of 3768 1636 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 100 PID 1636 wrote to memory of 3768 1636 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 100 PID 1636 wrote to memory of 3768 1636 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 100 PID 2764 wrote to memory of 3652 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 101 PID 2764 wrote to memory of 3652 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 101 PID 2764 wrote to memory of 3652 2764 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 101 PID 4580 wrote to memory of 984 4580 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 102 PID 4580 wrote to memory of 984 4580 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 102 PID 4580 wrote to memory of 984 4580 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 102 PID 4044 wrote to memory of 4296 4044 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 103 PID 4044 wrote to memory of 4296 4044 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 103 PID 4044 wrote to memory of 4296 4044 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 103 PID 2696 wrote to memory of 1256 2696 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 104 PID 2696 wrote to memory of 1256 2696 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 104 PID 2696 wrote to memory of 1256 2696 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 104 PID 1948 wrote to memory of 4568 1948 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 105 PID 1948 wrote to memory of 4568 1948 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 105 PID 1948 wrote to memory of 4568 1948 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 105 PID 3700 wrote to memory of 3824 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 107 PID 3700 wrote to memory of 3824 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 107 PID 3700 wrote to memory of 3824 3700 9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"7⤵PID:5820
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"8⤵PID:10616
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"7⤵PID:7740
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"7⤵PID:10408
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"7⤵PID:14128
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"7⤵PID:9516
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"7⤵PID:13408
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:7144
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"7⤵PID:12884
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:8720
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:12764
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:5516
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"7⤵PID:10648
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:7476
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:10104
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:14196
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:5540
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:8788
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:11300
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:6596
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:12388
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:8740
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:10840
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:6196
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"7⤵PID:10508
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:7952
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:10448
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:14564
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:5444
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:8732
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:11036
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:6940
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:12464
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:6520
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:3624
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:5584
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:10516
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:7684
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:10144
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:13480
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:8560
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:11136
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:7032
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:12856
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:9064
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:12168
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:5780
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"7⤵PID:10036
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"7⤵PID:13780
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:7732
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:10288
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:13728
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:5568
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:8316
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:10640
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:7016
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:12536
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:9072
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:12188
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:6272
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:10204
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:13560
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:8008
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:10440
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:15160
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:5460
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:8436
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:11080
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:7008
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:12568
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:9140
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:10352
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:5732
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:9960
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:13448
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:7932
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:10416
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:14552
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:8108
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:10904
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:6796
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:12876
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:8948
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:11380
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:10624
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:7724
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:10248
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:13720
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:5312
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:7312
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:12824
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:9608
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:13416
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:6528
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:11972
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:8396
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:11064
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:5576
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"7⤵PID:10116
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"7⤵PID:13472
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:7492
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"7⤵PID:14324
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:9696
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:13604
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:5756
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:8336
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:12804
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:7068
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:12900
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:9124
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:10500
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:9772
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:13612
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:7440
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:10008
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:13456
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:5708
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:8460
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:12840
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:7024
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:12832
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:8972
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:11516
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:6168
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:8276
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:13596
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:8028
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:10460
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:14940
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:5472
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:8956
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:11404
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:6772
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:12396
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:8964
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:11416
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:6908
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:12668
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:8704
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:12756
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:7944
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:10432
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:14308
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:6504
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:11524
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:8324
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:9700
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:6160
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:10196
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"6⤵PID:13568
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:7716
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:10336
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:14180
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:5452
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:7568
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:11072
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:6712
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:12796
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:8752
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:11292
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:5768
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:8724
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:13588
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:7748
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:9868
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:13712
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:5380
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:6752
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:10608
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:6544
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:12656
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:8288
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:10632
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:6212
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:8708
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"5⤵PID:13576
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:7924
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:10424
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:14120
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:5368
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:8020
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:10472
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:15124
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:6536
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:11708
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:8444
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:11056
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"2⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:6284
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:11316
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:5964
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:10532
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"2⤵PID:5264
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:7040
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"4⤵PID:12528
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:9112
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:12416
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"2⤵PID:6416
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"3⤵PID:10524
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"2⤵PID:8248
-
-
C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9d62d1a542c3e3cf884a28d32d949220_NEIKI.exe"2⤵PID:11128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\trambling licking (Samantha).mpeg.exe
Filesize1.4MB
MD510e1909f72db80a95882b111328ace49
SHA1a97f700c3a67f6850facfe23387f11449437a3fd
SHA256b9c0a528b1fb76e3349e7b65c424ed02b5126c6f74c00e8d4a01fcdbaa38d556
SHA51295b79e4f0f85ec9592b9cdc6ad8bbb767ceec3911c127a752c17a77b634591da92d88969a5adfd1e452098d07536aaee403779ddaf5f5734eb82740c67fff004