Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 07:55
Static task
static1
Behavioral task
behavioral1
Sample
19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe
-
Size
118KB
-
MD5
19f47f9c7ec34d46c0b12bbe2cab9480
-
SHA1
1bb83d48db3da4f939186fd4a6792d193466b269
-
SHA256
286345e515b19cb0369f74903bf6e370ae5206ff5371c38ba14bf766a1462b7c
-
SHA512
c761545e0034a99935fd7d3f97638ed56e8a79b60ede0c49d09ceca5a336e8f30b35e7ca6d84606fe372f2c8f1fe904c69ea6a73f2919eb2c368048464a5397b
-
SSDEEP
1536:lugZl+NXHI7ATu3h49/DEaUOJ6cI5VxFNEVSRsfyD75hIj6Kl6wnhdVuMJZL0HVq:Yw0XHuQDEayffhImKlnrzH2V6nR
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (86) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation IwMIkcMQ.exe -
Executes dropped EXE 2 IoCs
pid Process 4828 IwMIkcMQ.exe 972 MigsEAsc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IwMIkcMQ.exe = "C:\\Users\\Admin\\gQQwUkkE\\IwMIkcMQ.exe" IwMIkcMQ.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IwMIkcMQ.exe = "C:\\Users\\Admin\\gQQwUkkE\\IwMIkcMQ.exe" 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MigsEAsc.exe = "C:\\ProgramData\\ooAYoAkc\\MigsEAsc.exe" 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MigsEAsc.exe = "C:\\ProgramData\\ooAYoAkc\\MigsEAsc.exe" MigsEAsc.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe MigsEAsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 3192 reg.exe 3600 reg.exe 3512 reg.exe 4584 reg.exe 3240 reg.exe 2324 reg.exe 1520 reg.exe 4288 reg.exe 2204 reg.exe 3624 reg.exe 4592 reg.exe 2660 reg.exe 1304 reg.exe 3360 reg.exe 1600 reg.exe 456 reg.exe 2280 reg.exe 3500 reg.exe 2544 reg.exe 456 reg.exe 4328 reg.exe 2256 reg.exe 4212 reg.exe 4744 reg.exe 4824 reg.exe 4996 reg.exe 3228 reg.exe 2892 reg.exe 1824 reg.exe 2988 reg.exe 3096 reg.exe 4492 reg.exe 3044 reg.exe 3960 reg.exe 4172 reg.exe 1328 reg.exe 3956 reg.exe 2980 reg.exe 64 reg.exe 1148 reg.exe 1816 reg.exe 116 reg.exe 4904 reg.exe 3460 reg.exe 3396 reg.exe 4420 reg.exe 4376 reg.exe 4172 reg.exe 708 reg.exe 3224 reg.exe 2820 reg.exe 1212 reg.exe 452 reg.exe 4252 reg.exe 4384 reg.exe 1288 reg.exe 2820 reg.exe 4036 reg.exe 3504 reg.exe 3232 reg.exe 4696 reg.exe 1288 reg.exe 2476 reg.exe 2732 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4036 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4036 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4036 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4036 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2136 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2136 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2136 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2136 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2288 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2288 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2288 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2288 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 548 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 548 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 548 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 548 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4888 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4888 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4888 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4888 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4708 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4708 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4708 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4708 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2180 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2180 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2180 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2180 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 3980 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 3980 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 3980 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 3980 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 3668 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 3668 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 3668 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 3668 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2380 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2380 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2380 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2380 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2692 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2692 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2692 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 2692 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4460 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4460 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4460 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 4460 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4828 IwMIkcMQ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe 4828 IwMIkcMQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 4828 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 84 PID 2196 wrote to memory of 4828 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 84 PID 2196 wrote to memory of 4828 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 84 PID 2196 wrote to memory of 972 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 85 PID 2196 wrote to memory of 972 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 85 PID 2196 wrote to memory of 972 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 85 PID 2196 wrote to memory of 548 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 86 PID 2196 wrote to memory of 548 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 86 PID 2196 wrote to memory of 548 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 86 PID 548 wrote to memory of 3652 548 cmd.exe 89 PID 548 wrote to memory of 3652 548 cmd.exe 89 PID 548 wrote to memory of 3652 548 cmd.exe 89 PID 2196 wrote to memory of 3932 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 90 PID 2196 wrote to memory of 3932 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 90 PID 2196 wrote to memory of 3932 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 90 PID 2196 wrote to memory of 2552 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 91 PID 2196 wrote to memory of 2552 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 91 PID 2196 wrote to memory of 2552 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 91 PID 2196 wrote to memory of 4684 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 92 PID 2196 wrote to memory of 4684 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 92 PID 2196 wrote to memory of 4684 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 92 PID 2196 wrote to memory of 4352 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 93 PID 2196 wrote to memory of 4352 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 93 PID 2196 wrote to memory of 4352 2196 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 93 PID 4352 wrote to memory of 4944 4352 cmd.exe 98 PID 4352 wrote to memory of 4944 4352 cmd.exe 98 PID 4352 wrote to memory of 4944 4352 cmd.exe 98 PID 3652 wrote to memory of 1100 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 99 PID 3652 wrote to memory of 1100 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 99 PID 3652 wrote to memory of 1100 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 99 PID 1100 wrote to memory of 4968 1100 cmd.exe 101 PID 1100 wrote to memory of 4968 1100 cmd.exe 101 PID 1100 wrote to memory of 4968 1100 cmd.exe 101 PID 3652 wrote to memory of 5000 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 102 PID 3652 wrote to memory of 5000 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 102 PID 3652 wrote to memory of 5000 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 102 PID 3652 wrote to memory of 4752 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 103 PID 3652 wrote to memory of 4752 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 103 PID 3652 wrote to memory of 4752 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 103 PID 3652 wrote to memory of 3900 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 104 PID 3652 wrote to memory of 3900 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 104 PID 3652 wrote to memory of 3900 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 104 PID 3652 wrote to memory of 3872 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 105 PID 3652 wrote to memory of 3872 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 105 PID 3652 wrote to memory of 3872 3652 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 105 PID 3872 wrote to memory of 4188 3872 cmd.exe 110 PID 3872 wrote to memory of 4188 3872 cmd.exe 110 PID 3872 wrote to memory of 4188 3872 cmd.exe 110 PID 4968 wrote to memory of 3504 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 112 PID 4968 wrote to memory of 3504 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 112 PID 4968 wrote to memory of 3504 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 112 PID 3504 wrote to memory of 4036 3504 cmd.exe 114 PID 3504 wrote to memory of 4036 3504 cmd.exe 114 PID 3504 wrote to memory of 4036 3504 cmd.exe 114 PID 4968 wrote to memory of 1312 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 115 PID 4968 wrote to memory of 1312 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 115 PID 4968 wrote to memory of 1312 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 115 PID 4968 wrote to memory of 2128 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 116 PID 4968 wrote to memory of 2128 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 116 PID 4968 wrote to memory of 2128 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 116 PID 4968 wrote to memory of 2476 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 117 PID 4968 wrote to memory of 2476 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 117 PID 4968 wrote to memory of 2476 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 117 PID 4968 wrote to memory of 2568 4968 19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\gQQwUkkE\IwMIkcMQ.exe"C:\Users\Admin\gQQwUkkE\IwMIkcMQ.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4828
-
-
C:\ProgramData\ooAYoAkc\MigsEAsc.exe"C:\ProgramData\ooAYoAkc\MigsEAsc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"2⤵
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"4⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"6⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"8⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"10⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"12⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI13⤵
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"14⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"16⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"18⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"20⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"22⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"24⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"26⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"28⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"30⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"32⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI33⤵PID:4764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"34⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI35⤵PID:4528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"36⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI37⤵PID:4196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"38⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI39⤵PID:3688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"40⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI41⤵PID:892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"42⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI43⤵PID:1404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"44⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI45⤵PID:3376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"46⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI47⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"48⤵PID:528
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:4036
-
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI49⤵PID:4824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"50⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI51⤵PID:2184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"52⤵PID:3844
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI53⤵PID:1948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"54⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI55⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"56⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI57⤵PID:4496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"58⤵PID:1008
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI59⤵PID:4944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"60⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI61⤵PID:2208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"62⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI63⤵PID:4388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"64⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI65⤵PID:1404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"66⤵PID:4008
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI67⤵PID:3916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"68⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI69⤵PID:1948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"70⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI71⤵PID:2732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"72⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI73⤵PID:4212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"74⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI75⤵PID:3036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"76⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI77⤵PID:3740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"78⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI79⤵PID:1680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"80⤵PID:2012
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI81⤵PID:1600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"82⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI83⤵PID:396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"84⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI85⤵PID:708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"86⤵PID:456
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:3676
-
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI87⤵PID:4660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"88⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI89⤵PID:4948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"90⤵PID:2256
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:3144
-
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI91⤵PID:4404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"92⤵PID:1408
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI93⤵PID:2732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"94⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI95⤵PID:1728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"96⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI97⤵PID:952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"98⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI99⤵PID:4172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"100⤵PID:436
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI101⤵PID:3872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"102⤵PID:2004
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI103⤵PID:1216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"104⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI105⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"106⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI107⤵PID:1468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"108⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI109⤵PID:448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"110⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI111⤵PID:2980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"112⤵PID:4272
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI113⤵PID:708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"114⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI115⤵PID:1468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"116⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI117⤵PID:452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"118⤵PID:4528
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1119⤵PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI119⤵PID:2568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"120⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI121⤵PID:3184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19f47f9c7ec34d46c0b12bbe2cab9480_NEIKI"122⤵PID:760
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-