Analysis
-
max time kernel
15s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 09:37
Behavioral task
behavioral1
Sample
4b3d9a8630652665d5afde0495035b80_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4b3d9a8630652665d5afde0495035b80_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
4b3d9a8630652665d5afde0495035b80_NEIKI.exe
-
Size
808KB
-
MD5
4b3d9a8630652665d5afde0495035b80
-
SHA1
afb6fd6369f80b4b0ea8a26ea0cac29d4811d34d
-
SHA256
2b40c850bb225f6442ebae077ff479104f4fb9bd72e3db3fbbe73ba188f3f253
-
SHA512
8d1ba58f13ecb471c459dc9482e7809770a6523f6d93de97e0cb131a01d1de0f9d6c2ad8bd56f9201f8883c7abe7baf05c17027d52358ac47cfb90320266061d
-
SSDEEP
12288:CEQoSsyqQV9//JV0Ns17uYEPC/gknow8FX9O9F5rHb35+FpmFccWTYY:CV//J6CFuYEK/Tow859cJb3QnccP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 20 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 4b3d9a8630652665d5afde0495035b80_NEIKI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1632-0-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000a000000023ba4-5.dat upx behavioral2/memory/2608-12-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2020-175-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4860-177-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1268-178-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1632-187-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4224-189-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2608-188-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2192-190-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5048-192-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4836-191-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1632-193-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4388-197-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3540-196-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4860-195-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2020-194-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1268-198-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1532-201-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4924-200-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1520-203-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/800-202-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3644-199-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3508-204-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2568-207-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2640-206-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3760-205-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3640-208-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3604-210-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2792-209-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5008-214-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1548-213-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4224-212-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5164-217-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5156-216-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4608-215-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5048-218-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4924-222-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3644-221-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5440-220-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2712-219-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5488-223-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5576-226-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1520-225-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/800-224-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5708-233-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5700-232-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2568-231-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2980-228-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3508-227-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5800-237-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5860-240-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5008-239-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1548-238-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5792-236-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3604-235-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5232-243-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5164-242-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5156-241-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2792-234-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/6100-245-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5248-244-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5124-249-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5560-251-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 4b3d9a8630652665d5afde0495035b80_NEIKI.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\K: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\S: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\W: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\Y: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\G: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\J: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\L: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\M: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\R: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\T: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\Z: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\A: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\E: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\O: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\Q: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\B: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\N: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\P: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\U: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\V: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\X: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File opened (read-only) \??\I: 4b3d9a8630652665d5afde0495035b80_NEIKI.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\SHARED\danish handjob xxx public (Jade).mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\SysWOW64\config\systemprofile\tyrkish cum xxx catfight .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\SysWOW64\IME\SHARED\beast big latex .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\russian fetish xxx [bangbus] traffic .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\SysWOW64\FxsTmp\italian handjob hardcore full movie cock high heels (Karin).zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\System32\DriverStore\Temp\tyrkish fetish xxx catfight ejaculation .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\brasilian animal sperm several models cock ejaculation .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\lesbian masturbation (Samantha).mpeg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\blowjob masturbation hole .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\SysWOW64\FxsTmp\tyrkish cumshot trambling public cock (Sonja,Tatjana).avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\hardcore voyeur .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\SysWOW64\config\systemprofile\italian fetish hardcore [free] (Jade).mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\beast [bangbus] titts bedroom (Curtney).avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files (x86)\Google\Update\Download\american nude hardcore hot (!) sweet .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\trambling hidden traffic .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files\Microsoft Office\root\Templates\american kicking trambling [milf] .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files\Microsoft Office\Updates\Download\trambling voyeur sweet .mpeg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\horse several models hole ejaculation .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\canadian trambling uncut sm .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files (x86)\Microsoft\Temp\swedish gang bang sperm public glans bondage (Sarah).mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\blowjob big cock .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\hardcore hidden titts .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files (x86)\Google\Temp\american porn fucking [milf] feet bondage .mpeg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\blowjob [milf] (Melissa).mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\gay hot (!) high heels .mpeg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files\Common Files\microsoft shared\danish kicking beast catfight hole shower (Melissa).mpeg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files\dotnet\shared\russian handjob sperm [free] lady .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\danish beastiality lingerie big hotel .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\indian beastiality fucking [free] feet .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\gay licking stockings .mpeg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\american beastiality gay sleeping feet castration .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\sperm full movie hole hotel .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\american kicking trambling hidden glans sweet .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\lesbian big cock balls (Jade).zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\hardcore public fishy .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\swedish animal lesbian sleeping titts 40+ .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\trambling voyeur mature .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\blowjob full movie feet .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\american beastiality hardcore [free] cock .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\beast voyeur circumcision .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\canadian lesbian licking feet .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\japanese action blowjob lesbian shower .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\action sperm [free] hole bondage .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\chinese bukkake big .mpeg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\lingerie masturbation cock girly .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\SoftwareDistribution\Download\lingerie uncut .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\hardcore [bangbus] gorgeoushorny .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\gay full movie cock traffic .mpeg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\french lingerie hidden hole circumcision .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\tyrkish cum blowjob several models gorgeoushorny .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\beast [milf] hole stockings (Curtney).mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\InputMethod\SHARED\tyrkish kicking trambling sleeping cock hotel (Melissa).avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\swedish handjob beast hot (!) gorgeoushorny .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\porn beast uncut 50+ .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\german fucking hot (!) girly .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\fucking girls shower .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\gay uncut sm .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\tyrkish kicking gay lesbian granny .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\chinese beast girls .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\spanish gay catfight beautyfull .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ee7ea14f7d8a3ee3\beast full movie granny .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\animal trambling catfight sm .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\lesbian masturbation feet pregnant .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\horse trambling full movie hole .mpeg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\beast uncut 40+ .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\lingerie public glans castration (Tatjana).mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\fucking lesbian fishy .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\asian fucking sleeping sm .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\fetish gay girls feet .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\canadian xxx catfight hole ash .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\beastiality trambling hidden feet (Britney,Sarah).mpeg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\xxx public castration .mpeg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\xxx full movie traffic .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\lesbian [milf] hairy .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\russian handjob bukkake sleeping feet hotel .mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\german blowjob catfight feet (Kathrin,Curtney).zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\security\templates\brasilian beastiality beast several models .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\black beastiality sperm [milf] .mpeg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\italian animal beast uncut gorgeoushorny .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\gay catfight redhair (Sonja,Samantha).rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\mssrv.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\german lesbian masturbation circumcision .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\spanish lesbian several models Ôï .mpeg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\tyrkish porn horse full movie .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\italian porn beast public glans .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\assembly\tmp\danish action fucking hot (!) .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\Downloaded Program Files\american gang bang lingerie sleeping (Curtney).avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\japanese animal fucking hot (!) lady .rar.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\american gang bang beast uncut (Liz).zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\lesbian several models .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\indian kicking hardcore sleeping bedroom .zip.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\japanese kicking fucking several models titts leather .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\lingerie public .avi.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\black cum gay lesbian shoes (Britney,Jade).mpg.exe 4b3d9a8630652665d5afde0495035b80_NEIKI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2020 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2020 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4860 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4860 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1268 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1268 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1532 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1532 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 3760 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 3760 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 3640 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 3640 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2640 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2640 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4224 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4224 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 5048 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 5048 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1532 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1532 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4388 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4388 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 3540 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 3540 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2020 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2020 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4860 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 4860 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1268 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 1268 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2712 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 2712 4b3d9a8630652665d5afde0495035b80_NEIKI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2608 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 88 PID 1632 wrote to memory of 2608 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 88 PID 1632 wrote to memory of 2608 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 88 PID 2608 wrote to memory of 2192 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 92 PID 2608 wrote to memory of 2192 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 92 PID 2608 wrote to memory of 2192 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 92 PID 1632 wrote to memory of 4836 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 93 PID 1632 wrote to memory of 4836 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 93 PID 1632 wrote to memory of 4836 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 93 PID 2192 wrote to memory of 2020 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 98 PID 2192 wrote to memory of 2020 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 98 PID 2192 wrote to memory of 2020 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 98 PID 2608 wrote to memory of 4860 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 99 PID 2608 wrote to memory of 4860 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 99 PID 2608 wrote to memory of 4860 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 99 PID 1632 wrote to memory of 1268 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 100 PID 1632 wrote to memory of 1268 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 100 PID 1632 wrote to memory of 1268 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 100 PID 4836 wrote to memory of 1532 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 101 PID 4836 wrote to memory of 1532 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 101 PID 4836 wrote to memory of 1532 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 101 PID 4836 wrote to memory of 3760 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 103 PID 4836 wrote to memory of 3760 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 103 PID 4836 wrote to memory of 3760 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 103 PID 1632 wrote to memory of 2640 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 104 PID 1632 wrote to memory of 2640 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 104 PID 1632 wrote to memory of 2640 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 104 PID 2608 wrote to memory of 4224 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 105 PID 2608 wrote to memory of 4224 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 105 PID 2608 wrote to memory of 4224 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 105 PID 2192 wrote to memory of 3640 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 106 PID 2192 wrote to memory of 3640 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 106 PID 2192 wrote to memory of 3640 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 106 PID 1532 wrote to memory of 4608 1532 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 107 PID 1532 wrote to memory of 4608 1532 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 107 PID 1532 wrote to memory of 4608 1532 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 107 PID 4860 wrote to memory of 5048 4860 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 108 PID 4860 wrote to memory of 5048 4860 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 108 PID 4860 wrote to memory of 5048 4860 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 108 PID 2020 wrote to memory of 3540 2020 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 109 PID 2020 wrote to memory of 3540 2020 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 109 PID 2020 wrote to memory of 3540 2020 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 109 PID 1268 wrote to memory of 4388 1268 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 110 PID 1268 wrote to memory of 4388 1268 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 110 PID 1268 wrote to memory of 4388 1268 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 110 PID 2192 wrote to memory of 2712 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 111 PID 2192 wrote to memory of 2712 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 111 PID 2192 wrote to memory of 2712 2192 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 111 PID 2608 wrote to memory of 3644 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 112 PID 2608 wrote to memory of 3644 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 112 PID 2608 wrote to memory of 3644 2608 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 112 PID 1632 wrote to memory of 4924 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 113 PID 1632 wrote to memory of 4924 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 113 PID 1632 wrote to memory of 4924 1632 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 113 PID 4836 wrote to memory of 800 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 114 PID 4836 wrote to memory of 800 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 114 PID 4836 wrote to memory of 800 4836 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 114 PID 3760 wrote to memory of 1520 3760 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 115 PID 3760 wrote to memory of 1520 3760 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 115 PID 3760 wrote to memory of 1520 3760 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 115 PID 2640 wrote to memory of 2980 2640 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 116 PID 2640 wrote to memory of 2980 2640 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 116 PID 2640 wrote to memory of 2980 2640 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 116 PID 1532 wrote to memory of 3508 1532 4b3d9a8630652665d5afde0495035b80_NEIKI.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:5248
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"7⤵PID:6796
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"8⤵PID:12220
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"8⤵PID:13276
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"7⤵PID:8804
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"7⤵PID:11772
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"7⤵PID:13300
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:6184
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"7⤵PID:9076
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"7⤵PID:10272
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"7⤵PID:13248
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:6492
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"7⤵PID:11432
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"7⤵PID:11484
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:7552
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:11192
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13148
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:16184
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:7300
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"7⤵PID:14112
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:9448
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:14208
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:5792
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:9884
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13604
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:6616
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:11440
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:10692
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:8436
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:10976
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13396
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:6536
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"7⤵PID:13708
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:8784
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:11336
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13316
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:6000
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:9852
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13628
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:6624
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:11512
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13192
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:8288
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:10932
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13404
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:5560
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:10236
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13516
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:6568
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:11356
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13224
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:8304
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:10112
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:15692
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13340
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:5448
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:10344
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13508
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:6584
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13580
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:7448
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:10868
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13420
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:5232
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:6804
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"7⤵PID:14232
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:8768
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:11376
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13080
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:5720
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:9620
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:14216
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:6500
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:11384
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13076
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:7540
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:10856
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13452
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:6308
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:10128
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13724
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:6688
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:11416
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:2808
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:8496
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:11368
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13088
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:5800
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:6728
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:10668
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13468
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:6632
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:11788
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13308
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:8428
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:10564
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13332
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:7292
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13156
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:8524
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:10412
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13236
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:5988
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:7236
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:10676
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13476
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:6648
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:11392
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13064
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:8460
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:11140
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13380
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵
- Checks computer location settings
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:5664
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:10532
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13484
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:6888
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:14200
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:8992
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:11832
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13288
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:5440
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:9940
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13732
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:6864
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13668
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:8776
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:11448
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:12172
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:5164
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:6788
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"7⤵PID:14224
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:8748
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:11460
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:3192
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:9280
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13700
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:6552
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:11780
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:12152
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:8348
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:11012
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13388
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:6592
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:11488
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:1604
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:8272
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:11164
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13132
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:5692
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:9820
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13620
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:6664
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13676
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:8568
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:11312
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13096
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:6332
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:8760
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:11328
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13900
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:6696
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13652
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:8476
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:10160
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13372
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:5700
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:10000
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13164
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:6600
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:11408
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:2220
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:8296
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:10960
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13428
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵
- Checks computer location settings
PID:800 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:9372
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13660
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:6516
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:11644
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13212
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:8624
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:11400
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13072
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:5576
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:9876
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13588
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:6560
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:11636
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13108
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:8420
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:11180
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:13364
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:6780
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"6⤵PID:13636
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:8468
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:11156
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13348
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:6100
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:10540
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13492
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:6656
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13716
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:8280
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:10968
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13412
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:6544
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:10844
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13436
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:8320
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:11172
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13116
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:5860
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:9992
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13612
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:6640
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13644
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:8484
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:11304
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:13124
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:6344
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:10704
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13460
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:6672
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"5⤵PID:13692
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:8444
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:11148
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13356
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:5708
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:10064
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13596
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:6608
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:11424
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:12304
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:8412
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:10120
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:13140
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"2⤵
- Checks computer location settings
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:5124
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:9364
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:12060
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13204
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:6508
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"4⤵PID:13684
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:8452
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:10604
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:13324
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"2⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:10352
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:13500
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"2⤵PID:6576
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:11752
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"3⤵PID:12160
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"2⤵PID:7564
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"2⤵PID:10876
-
-
C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\4b3d9a8630652665d5afde0495035b80_NEIKI.exe"2⤵PID:13444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\blowjob big cock .mpg.exe
Filesize616KB
MD5ecfd93e594e01936823bfce1dabf50ec
SHA1bdfe2ca902ff0396827d00dfd166faf365da2b2e
SHA25681f89f2c35bf56af508b1d14ec366930c230256ab157b9ab88a3178acf8355c4
SHA51249a2c96b413f2e1a3b71b9aa33ec709e11455541fc3bbaa12cb96f5471422758818d714c5476c304ed51f1d884702327a920e8519d397c05fc54d33e10944507