Analysis
-
max time kernel
15s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 09:12
Behavioral task
behavioral1
Sample
3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe
-
Size
1.9MB
-
MD5
3ee9ddb1d5d5527c8255cb234a2a47f0
-
SHA1
6bed48497510f04ba0b156f648ebb12d38a15cb3
-
SHA256
b8fe5de4cb7bb60d7cb784c5dd2f19339866df69fee4c9414d458a78e5dea24f
-
SHA512
ba358e0c0919f73963f8d04e69db04b33abe6cc0c9efd3daa2baba04183f8009c35ab17da60db3710933acd10d8e28f3f02e9ec47825c5b4b9e5e39f4cb6b43d
-
SSDEEP
49152:kuGdW8Lc2M98jGNcEhjLeudw1ieGGx/8BbhMFfsBUO:wU8LAOjGNcm+ujIx9I/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/228-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/files/0x0002000000022abb-5.dat upx behavioral2/memory/2096-24-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1944-151-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4448-184-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5092-185-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4984-188-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1420-187-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/228-186-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2096-189-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2856-191-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1944-190-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2300-193-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3592-192-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4384-195-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4968-194-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/228-196-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4496-199-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1040-198-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2784-200-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1116-197-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4208-202-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2608-201-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/60-205-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4448-204-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4256-203-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1096-207-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4576-206-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2192-210-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2268-211-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4984-209-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1420-208-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5224-213-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1732-212-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5236-215-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2856-214-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2300-216-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4384-217-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5348-218-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5376-219-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2784-223-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4208-224-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5512-227-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5460-226-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4256-225-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/60-229-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2808-228-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/6180-233-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5224-238-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5236-242-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/6376-243-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/6356-245-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/6304-239-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/6212-236-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2268-235-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2192-234-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1096-232-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4576-230-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4812-231-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/6460-248-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/6452-246-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/6560-249-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5336-244-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/6636-253-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\V: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\B: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\I: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\N: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\S: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\X: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\Z: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\G: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\J: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\L: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\O: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\P: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\Q: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\T: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\E: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\K: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\R: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\U: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\W: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\Y: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\A: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File opened (read-only) \??\H: 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\System32\LogFiles\Fax\Incoming\british xxx fetish catfight .zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SysWOW64\FxsTmp\japanese handjob catfight 50+ (Karin).avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SysWOW64\IME\SHARED\tyrkish gang bang lesbian vagina bondage .zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\norwegian horse cum catfight pregnant .mpeg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\cumshot full movie mistress .avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\malaysia porn trambling hot (!) nipples pregnant (Gina,Jade).rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SysWOW64\config\systemprofile\brasilian action horse girls (Tatjana).avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\kicking cum [free] glans swallow (Ashley).avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SysWOW64\config\systemprofile\russian lesbian bukkake public cock (Jenna).zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\System32\DriverStore\Temp\black horse catfight .zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SysWOW64\FxsTmp\swedish fetish girls glans stockings .avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SysWOW64\IME\SHARED\japanese lesbian cum [free] glans ejaculation (Britney).rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Templates\spanish nude [free] vagina (Curtney).zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\chinese gay beast [milf] .mpeg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files (x86)\Google\Temp\swedish beast handjob catfight (Britney,Sarah).avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files (x86)\Microsoft\Temp\lesbian hidden Ôï .avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files\dotnet\shared\animal hot (!) lady .mpeg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files\Microsoft Office\Updates\Download\malaysia cum horse [free] .rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files (x86)\Google\Update\Download\porn porn [milf] glans castration .mpeg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files (x86)\Microsoft\Temp\EU9848.tmp\russian gay beastiality catfight legs ¼ë (Britney,Janette).avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\brasilian gay sperm hidden latex .mpeg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files\Common Files\microsoft shared\african beast hardcore girls .avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\swedish lingerie gay catfight .rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\trambling cum masturbation vagina castration .zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\horse [free] hole redhair (Liz,Anniston).zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\lesbian uncut (Tatjana,Anniston).zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\norwegian fucking voyeur balls .rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\canadian fucking [free] hole bondage .zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\gay gang bang sleeping glans mature .avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\russian bukkake [milf] (Christine).avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\action trambling girls ash (Samantha,Janette).mpeg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\british handjob [free] Ôï .zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\danish beastiality voyeur cock high heels .mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\assembly\temp\black gay action licking bedroom (Samantha).rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\african trambling lesbian shoes (Tatjana).avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\swedish lesbian fucking full movie hole .mpeg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\norwegian action nude lesbian nipples (Jade,Sylvia).rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\tyrkish lingerie cumshot [free] traffic .mpeg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\hardcore hot (!) gorgeoushorny (Tatjana).rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\trambling girls glans YEâPSè& .avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\horse xxx big YEâPSè& (Janette).mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\canadian hardcore sperm sleeping nipples .rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\japanese horse gang bang hot (!) .zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..se-shared-datafiles_31bf3856ad364e35_10.0.19041.1_none_2f5f00d280dce9f6\asian kicking hidden circumcision (Kathrin,Sonja).mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\fucking gay masturbation shower (Anniston,Christine).rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\russian beast hot (!) granny .mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\cumshot sleeping 50+ .mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\japanese animal sleeping ash leather .mpeg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\horse catfight .mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\xxx sleeping (Curtney,Karin).avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\assembly\tmp\asian gay [milf] hole swallow .mpeg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\CbsTemp\german fucking hardcore licking blondie .mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\InputMethod\SHARED\asian nude catfight gorgeoushorny .rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\handjob xxx hot (!) .mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\american xxx hardcore big .rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\norwegian bukkake [free] shower .zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\action lesbian .zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\indian nude uncut penetration .rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\african fetish licking .mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\indian lesbian full movie .zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\asian beast masturbation ash (Melissa,Melissa).avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\spanish sperm animal voyeur .mpeg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\african beast hidden black hairunshaved .zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\indian beast catfight .rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\indian sperm handjob uncut swallow (Sarah,Melissa).avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\hardcore big feet black hairunshaved (Jade).rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\black trambling trambling several models lady .avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\norwegian gang bang sleeping sweet (Gina,Sonja).mpeg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\malaysia blowjob girls .mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\black cum fucking licking penetration .avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\lingerie [free] glans .mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\brasilian handjob gang bang licking .avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\german fucking catfight titts .rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SoftwareDistribution\Download\brasilian beastiality lesbian [milf] castration .rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\malaysia animal lesbian ejaculation (Sandy,Jade).avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\french beastiality masturbation black hairunshaved (Tatjana,Melissa).rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\action [bangbus] .mpeg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\security\templates\beast blowjob licking circumcision (Jenna).rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_211cf1c632a13851\blowjob voyeur Ôï .rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\fucking full movie ejaculation .avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\brasilian xxx catfight (Gina).mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\Downloaded Program Files\indian fetish beastiality [bangbus] ash ejaculation (Sandy).mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\tyrkish cum catfight titts .mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\indian lesbian [free] ash .zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\action cum several models stockings .avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\swedish xxx beast sleeping legs (Sandy).zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\danish gay uncut beautyfull (Britney).zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\PLA\Templates\british horse xxx hidden hole girly .mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\hardcore public hole bondage (Melissa).rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\beast masturbation femdom .rar.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\nude uncut ash .zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\german gay lesbian YEâPSè& .mpeg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\xxx masturbation high heels .avi.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\british blowjob horse voyeur legs .zip.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\handjob sleeping beautyfull .mpg.exe 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 3592 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 3592 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 4968 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 4968 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1116 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1116 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 4496 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 4496 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2608 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2608 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 3592 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 3592 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 4448 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 4448 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 5092 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 5092 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 4968 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 4968 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1420 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 4984 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 4984 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1420 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1732 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1732 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2856 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2856 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1116 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1116 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2300 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2300 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 3592 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 3592 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 4496 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 4496 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 4384 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 4384 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2608 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 2608 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1040 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 1040 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 2096 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 89 PID 228 wrote to memory of 2096 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 89 PID 228 wrote to memory of 2096 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 89 PID 228 wrote to memory of 1944 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 94 PID 228 wrote to memory of 1944 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 94 PID 228 wrote to memory of 1944 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 94 PID 2096 wrote to memory of 3592 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 95 PID 2096 wrote to memory of 3592 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 95 PID 2096 wrote to memory of 3592 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 95 PID 228 wrote to memory of 4968 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 96 PID 228 wrote to memory of 4968 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 96 PID 228 wrote to memory of 4968 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 96 PID 1944 wrote to memory of 1116 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 97 PID 1944 wrote to memory of 1116 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 97 PID 1944 wrote to memory of 1116 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 97 PID 2096 wrote to memory of 4496 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 98 PID 2096 wrote to memory of 4496 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 98 PID 2096 wrote to memory of 4496 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 98 PID 3592 wrote to memory of 2608 3592 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 99 PID 3592 wrote to memory of 2608 3592 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 99 PID 3592 wrote to memory of 2608 3592 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 99 PID 4968 wrote to memory of 4448 4968 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 101 PID 4968 wrote to memory of 4448 4968 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 101 PID 4968 wrote to memory of 4448 4968 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 101 PID 228 wrote to memory of 5092 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 102 PID 228 wrote to memory of 5092 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 102 PID 228 wrote to memory of 5092 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 102 PID 1944 wrote to memory of 4984 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 103 PID 1944 wrote to memory of 4984 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 103 PID 1944 wrote to memory of 4984 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 103 PID 2096 wrote to memory of 1420 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 104 PID 2096 wrote to memory of 1420 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 104 PID 2096 wrote to memory of 1420 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 104 PID 1116 wrote to memory of 1732 1116 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 105 PID 1116 wrote to memory of 1732 1116 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 105 PID 1116 wrote to memory of 1732 1116 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 105 PID 3592 wrote to memory of 2856 3592 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 106 PID 3592 wrote to memory of 2856 3592 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 106 PID 3592 wrote to memory of 2856 3592 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 106 PID 4496 wrote to memory of 2300 4496 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 107 PID 4496 wrote to memory of 2300 4496 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 107 PID 4496 wrote to memory of 2300 4496 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 107 PID 2608 wrote to memory of 4384 2608 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 108 PID 2608 wrote to memory of 4384 2608 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 108 PID 2608 wrote to memory of 4384 2608 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 108 PID 228 wrote to memory of 1040 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 111 PID 228 wrote to memory of 1040 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 111 PID 228 wrote to memory of 1040 228 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 111 PID 4968 wrote to memory of 2784 4968 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 112 PID 4968 wrote to memory of 2784 4968 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 112 PID 4968 wrote to memory of 2784 4968 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 112 PID 4448 wrote to memory of 4208 4448 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 114 PID 4448 wrote to memory of 4208 4448 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 114 PID 4448 wrote to memory of 4208 4448 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 114 PID 1944 wrote to memory of 4256 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 113 PID 1944 wrote to memory of 4256 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 113 PID 1944 wrote to memory of 4256 1944 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 113 PID 2096 wrote to memory of 2808 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 115 PID 2096 wrote to memory of 2808 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 115 PID 2096 wrote to memory of 2808 2096 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 115 PID 1116 wrote to memory of 60 1116 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 116 PID 1116 wrote to memory of 60 1116 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 116 PID 1116 wrote to memory of 60 1116 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 116 PID 4496 wrote to memory of 4576 4496 3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"7⤵PID:6376
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"8⤵PID:13900
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"7⤵PID:7900
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"7⤵PID:11296
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"7⤵PID:14152
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:5460
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"7⤵PID:8660
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"7⤵PID:11460
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"7⤵PID:13672
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:7008
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"7⤵PID:13936
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:7644
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:9656
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:14044
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:6560
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"7⤵PID:14016
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:7852
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:10704
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:14064
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:5512
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:7968
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:10452
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:14036
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:6968
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:13504
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:15908
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7788
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:14216
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:10000
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13984
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:5336
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:6304
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"7⤵PID:13896
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:7892
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:11220
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:14136
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:5480
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:9152
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:12040
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"7⤵PID:15380
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:13624
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:6780
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:13952
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7820
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:10024
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:14008
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:6444
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:14296
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7628
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:10720
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13716
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:5520
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:8880
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:11676
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13656
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:6976
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13800
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:7772
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:11660
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:13640
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:5800
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:5376
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:6600
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"7⤵PID:13912
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:7844
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:10684
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:14096
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:5452
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:8784
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:11820
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:13608
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7144
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:11236
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:13748
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7652
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:10664
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:14072
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:6460
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:14208
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7868
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:10972
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:14112
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:5536
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:8224
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:11276
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13732
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:7000
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:14264
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:7960
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:11668
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:13664
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:6628
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:13828
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7836
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:10692
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13520
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:2160
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:5504
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7940
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:10324
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:14240
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:6880
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13928
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:7756
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:15772
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:9648
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:13976
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:6196
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:11384
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13688
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:7916
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:10112
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:14000
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:5552
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:8916
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:12196
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:13600
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:7156
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:11336
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:13680
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:7620
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:9632
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:13968
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:5236
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:6452
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"7⤵PID:13528
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"7⤵PID:15820
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:7876
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:10712
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:14104
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:5496
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:8872
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:12304
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:13488
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:5044
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:6760
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:13944
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7604
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:11288
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13720
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:6636
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:13888
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7828
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:10676
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:14248
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:5544
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7948
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:11440
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13740
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:7024
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13808
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:7740
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:11004
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:14120
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:5224
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:6188
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:13960
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7932
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:11228
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:14128
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7356
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:14200
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7636
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:10316
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13496
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:16340
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:6788
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13820
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:7804
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:10032
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:13992
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:6180
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:10536
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:14080
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:7924
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:10964
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:13704
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:5560
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:8900
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:11848
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:13632
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:7088
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:14232
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:7764
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:10008
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:14024
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:6592
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"6⤵PID:13880
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:7860
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:10728
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13472
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:5804
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:5568
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:8956
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:12080
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13616
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:6984
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13920
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:7780
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:9992
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:14256
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:6212
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13836
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:7908
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:10884
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:14088
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:5576
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:8888
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:11448
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:13696
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:6960
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:13792
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:7748
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:11248
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:13512
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:15828
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:6356
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:13536
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"5⤵PID:5592
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:7612
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:9616
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:14272
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:5528
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:8924
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:12188
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:13592
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:5660
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:6992
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:13784
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:7812
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:10016
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:13764
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:6380
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"4⤵PID:14224
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:7884
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:10840
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:14144
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"2⤵PID:5584
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:8908
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:11840
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:13648
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:5732
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"2⤵PID:6936
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"3⤵PID:14192
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"2⤵PID:7796
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"2⤵PID:10040
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"2⤵PID:13480
-
-
C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3ee9ddb1d5d5527c8255cb234a2a47f0_NEIKI.exe"2⤵PID:15596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\canadian fucking [free] hole bondage .zip.exe
Filesize686KB
MD54ebc5c970868b966f3aa47f95de7c306
SHA19a4c652b6801a96e970a3a57a4aba493ec7403d9
SHA256d77a82efbf0e5385082b775de483dfd60fefc9b1606bbf21c50b982ac085aee7
SHA512d798c060e604f50875d9401f1487ac5c070b0e82998138a506d12dd47393a95415ecd19911464d8298719292d0c0c7483c80e3c12dd41fe951f263c03aafd218