Analysis
-
max time kernel
16s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 02:18
Behavioral task
behavioral1
Sample
cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe
-
Size
1.4MB
-
MD5
cc8fbaeab63f0951608a7da11187bdf0
-
SHA1
17fd49063dc38220bf327ed8579e953670191c49
-
SHA256
bf497b0fe91e2a323418ff688ab4c3779a9dea4020fa9a934aded3219d4e7359
-
SHA512
054f0e19e155208fd9e7328e6db34d7731d57c090a3a5c110e8583c1d87a88972443769afe2adacd4aef9d4524d5b4085cd95ed38842b6059f3c3ec100ca9b9c
-
SSDEEP
24576:JBRHAkDq7ClAaDA+bZtHGmgb0Hy/wmUfeD9Ol/xGzVqBdVsIY:PaQnlAEZtHHgODGD4l/wWyIY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 18 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3604-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x00070000000233b3-5.dat upx behavioral2/memory/4964-32-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2948-153-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1928-154-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/984-180-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3936-181-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1812-183-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1708-182-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3572-184-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1412-186-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2416-188-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4520-187-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3604-185-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4964-189-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2948-190-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1928-192-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3604-191-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/984-193-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/624-194-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/220-196-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3936-195-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1812-197-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4348-198-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1016-199-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3592-200-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3572-201-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3124-202-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2416-206-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1620-208-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4968-207-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4520-205-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4960-204-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2080-203-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4580-210-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1272-209-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5008-211-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/900-214-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/116-216-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/220-215-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/624-213-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4928-217-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3124-218-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2360-219-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4420-220-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1952-222-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4968-221-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3036-223-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1940-228-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1284-227-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4580-226-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1524-229-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/900-231-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4080-232-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4652-234-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2804-236-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3364-239-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1904-238-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2320-235-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1400-233-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4772-230-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2360-243-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5024-247-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5520-246-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\P: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\S: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\U: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\W: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\E: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\H: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\I: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\Y: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\Z: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\B: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\L: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\X: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\G: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\Q: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\R: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\N: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\O: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\T: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\V: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\A: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\K: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File opened (read-only) \??\M: cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\fucking voyeur feet ¼ë .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\SysWOW64\IME\SHARED\tyrkish action hardcore several models titts .mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\american gang bang bukkake voyeur hairy .rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\tyrkish animal xxx [free] ejaculation .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\SysWOW64\FxsTmp\black action lesbian public cock mistress .mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\black cum gay catfight circumcision .mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\russian animal lesbian hot (!) (Tatjana).mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\System32\DriverStore\Temp\canadian horse masturbation mature .mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\SysWOW64\FxsTmp\black gang bang sperm hidden bondage .mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\russian horse gay catfight cock latex (Jade).rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\SysWOW64\config\systemprofile\indian action blowjob [free] glans .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\SysWOW64\IME\SHARED\sperm public (Sarah).avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\black fetish fucking voyeur glans .mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\xxx uncut young .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files\dotnet\shared\swedish handjob trambling masturbation titts (Anniston,Sylvia).mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\black nude trambling hot (!) glans pregnant .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\indian horse trambling [milf] hairy .mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\swedish horse sperm girls cock sweet .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files (x86)\Google\Temp\gay girls .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\american horse sperm hidden leather .rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\horse hidden glans .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\bukkake sleeping hotel .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files\Microsoft Office\Updates\Download\sperm several models feet swallow (Jade).avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\tyrkish horse lingerie girls glans latex (Janette).mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\american horse trambling hidden .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files\Microsoft Office\root\Templates\danish kicking horse girls (Samantha).avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\danish handjob blowjob several models girly .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\italian animal fucking licking titts (Jenna,Janette).rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Program Files (x86)\Google\Update\Download\american handjob lingerie [bangbus] titts .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\malaysia blowjob voyeur castration .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ee7ea14f7d8a3ee3\french lesbian uncut mistress .mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\canadian blowjob big hole stockings .rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\danish cum lesbian catfight (Sarah).avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\lingerie public hole sweet .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\danish nude gay big ejaculation .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\tyrkish cum xxx sleeping blondie .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\black fetish xxx voyeur hole sweet (Karin).mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\spanish hardcore uncut (Karin).rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\blowjob public mistress .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\beast big hotel .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\brasilian kicking bukkake [bangbus] cock gorgeoushorny .mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\black handjob fucking public .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\black animal blowjob catfight glans granny (Karin).mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\tyrkish cum trambling hot (!) blondie .rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\american horse sperm [free] glans bondage (Sylvia).mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\hardcore [bangbus] granny .mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\malaysia trambling full movie boots .rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\InputMethod\SHARED\sperm masturbation .mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\canadian gay girls hole hairy (Sarah).avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\fetish horse licking swallow (Kathrin,Sylvia).zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\Downloaded Program Files\horse lesbian upskirt (Sandy,Sylvia).mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\fucking sleeping bondage .mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\hardcore masturbation boots .mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\malaysia blowjob sleeping hole boots (Tatjana).rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\tyrkish beastiality trambling sleeping shoes .rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\blowjob [bangbus] 40+ .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_fd7349c396c417ae\handjob fucking [bangbus] .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\fucking hot (!) shower (Ashley,Curtney).mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\gang bang bukkake several models shoes .mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\asian bukkake [free] feet .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_5abbd3c4a3f2014c\blowjob lesbian hole stockings .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\hardcore [free] upskirt .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\hardcore lesbian granny .mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\gang bang sperm voyeur .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\bukkake public blondie (Britney,Samantha).mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\spanish horse full movie cock .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\swedish fetish fucking masturbation 40+ .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_5af076e0a3cb0fa7\horse [bangbus] castration .rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\indian cumshot hardcore catfight glans shower (Karin).zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\italian cumshot horse full movie .mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\lesbian lesbian ejaculation .mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\french trambling big titts swallow .rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\spanish xxx uncut feet .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\danish action lingerie uncut feet 40+ .mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\swedish cumshot hardcore [free] (Jade).mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\black nude lingerie [bangbus] hole .mpg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\indian fetish beast voyeur penetration (Jenna,Sarah).zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\chinese fucking [milf] latex .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\japanese porn gay masturbation .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\indian fetish hardcore [free] YEâPSè& .rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\horse xxx voyeur 50+ .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\fucking voyeur titts .rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\kicking horse voyeur traffic .rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\norwegian lesbian public hole wifey (Karin).rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\canadian lingerie full movie hole .rar.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\british sperm licking YEâPSè& (Sonja,Karin).mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\CbsTemp\indian cumshot trambling hidden high heels .zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\indian cumshot fucking catfight granny .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\russian beastiality lesbian uncut cock black hairunshaved (Sarah).zip.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..se-shared-datafiles_31bf3856ad364e35_10.0.19041.1_none_2f5f00d280dce9f6\beastiality sperm big sweet .mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\italian nude fucking hidden wifey .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\kicking trambling [milf] penetration (Gina,Sylvia).mpeg.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\spanish beast full movie .avi.exe cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 984 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 984 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3936 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3936 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1708 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1708 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1812 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1812 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3592 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3592 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3572 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3572 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 984 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 984 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 2080 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 2080 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1412 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1412 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 2416 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 2416 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 4520 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 4520 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3936 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 3936 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1620 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1620 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1272 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1272 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1708 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1708 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1812 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 1812 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 5008 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 5008 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3604 wrote to memory of 4964 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 83 PID 3604 wrote to memory of 4964 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 83 PID 3604 wrote to memory of 4964 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 83 PID 3604 wrote to memory of 2948 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 84 PID 3604 wrote to memory of 2948 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 84 PID 3604 wrote to memory of 2948 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 84 PID 4964 wrote to memory of 1928 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 85 PID 4964 wrote to memory of 1928 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 85 PID 4964 wrote to memory of 1928 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 85 PID 3604 wrote to memory of 984 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 86 PID 3604 wrote to memory of 984 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 86 PID 3604 wrote to memory of 984 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 86 PID 4964 wrote to memory of 3936 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 87 PID 4964 wrote to memory of 3936 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 87 PID 4964 wrote to memory of 3936 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 87 PID 2948 wrote to memory of 1708 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 88 PID 2948 wrote to memory of 1708 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 88 PID 2948 wrote to memory of 1708 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 88 PID 1928 wrote to memory of 1812 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 89 PID 1928 wrote to memory of 1812 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 89 PID 1928 wrote to memory of 1812 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 89 PID 984 wrote to memory of 3592 984 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 90 PID 984 wrote to memory of 3592 984 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 90 PID 984 wrote to memory of 3592 984 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 90 PID 3604 wrote to memory of 3572 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 91 PID 3604 wrote to memory of 3572 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 91 PID 3604 wrote to memory of 3572 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 91 PID 4964 wrote to memory of 2080 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 92 PID 4964 wrote to memory of 2080 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 92 PID 4964 wrote to memory of 2080 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 92 PID 2948 wrote to memory of 1412 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 93 PID 2948 wrote to memory of 1412 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 93 PID 2948 wrote to memory of 1412 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 93 PID 1928 wrote to memory of 4520 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 94 PID 1928 wrote to memory of 4520 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 94 PID 1928 wrote to memory of 4520 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 94 PID 3936 wrote to memory of 2416 3936 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 95 PID 3936 wrote to memory of 2416 3936 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 95 PID 3936 wrote to memory of 2416 3936 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 95 PID 1708 wrote to memory of 1620 1708 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 96 PID 1708 wrote to memory of 1620 1708 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 96 PID 1708 wrote to memory of 1620 1708 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 96 PID 1812 wrote to memory of 1272 1812 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 97 PID 1812 wrote to memory of 1272 1812 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 97 PID 1812 wrote to memory of 1272 1812 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 97 PID 3592 wrote to memory of 5008 3592 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 98 PID 3592 wrote to memory of 5008 3592 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 98 PID 3592 wrote to memory of 5008 3592 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 98 PID 3604 wrote to memory of 624 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 99 PID 3604 wrote to memory of 624 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 99 PID 3604 wrote to memory of 624 3604 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 99 PID 4964 wrote to memory of 220 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 100 PID 4964 wrote to memory of 220 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 100 PID 4964 wrote to memory of 220 4964 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 100 PID 984 wrote to memory of 116 984 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 101 PID 984 wrote to memory of 116 984 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 101 PID 984 wrote to memory of 116 984 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 101 PID 1928 wrote to memory of 4348 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 102 PID 1928 wrote to memory of 4348 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 102 PID 1928 wrote to memory of 4348 1928 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 102 PID 2948 wrote to memory of 1016 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 103 PID 2948 wrote to memory of 1016 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 103 PID 2948 wrote to memory of 1016 2948 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 103 PID 1708 wrote to memory of 4928 1708 cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"7⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"8⤵PID:9680
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"8⤵PID:15960
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"7⤵PID:6684
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"7⤵PID:8700
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"7⤵PID:10680
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"7⤵PID:11360
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:7020
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:8800
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:12444
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:6120
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"7⤵PID:12196
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:8112
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:8728
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:12500
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:10132
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:14452
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:6860
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:8840
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:12736
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:6180
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"7⤵PID:10140
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"7⤵PID:14620
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:8976
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:13172
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:11868
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:7164
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:8888
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:13240
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:6128
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:10452
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:14912
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:7804
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:8644
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:11144
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:7072
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:8784
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:12420
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:8064
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:8636
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:12080
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:6608
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:9704
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8920
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:13232
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:5784
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"7⤵PID:11832
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:7672
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:8652
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:12108
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:11944
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:5228
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:8848
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:13248
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:6232
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:9688
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:7780
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:8692
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:11116
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:11584
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:6416
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8832
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:13068
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:11908
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:7172
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:8712
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:12396
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:11544
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:7012
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8824
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:12484
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:5676
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:11528
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:7624
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8768
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:13216
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:5140
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:8704
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:15936
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:7556
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8720
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:12412
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:7732
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8776
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:12428
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:6516
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:9744
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:13224
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:8952
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:13156
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:6208
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"7⤵PID:11960
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:7768
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:8680
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:10312
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:11536
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:6072
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:8880
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:12492
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:6224
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:11520
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:8996
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:12436
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:11628
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:7232
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8816
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:12632
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:6200
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:11312
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:9020
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:14740
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:11952
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:5696
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8872
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:12676
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:6336
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:9696
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:15928
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:9012
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:14632
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:7224
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8792
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:13164
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:6432
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8864
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:12460
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:6508
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:11320
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:8944
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:13764
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:5920
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"7⤵PID:10352
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"7⤵PID:14868
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:7752
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:8760
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:12556
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:11640
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:6812
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:11128
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:8912
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:13188
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:6136
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:11928
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:7852
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"6⤵PID:15168
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:8752
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:12388
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:9736
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:14252
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:6944
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:14160
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8904
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:12468
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:5520
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:10276
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:14648
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:7156
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8856
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:12752
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:5792
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:10668
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:15920
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:7320
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8672
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:11104
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8052
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8660
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:11036
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:6740
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:11936
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:8936
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:13836
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:6216
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:9764
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:14372
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:9004
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:12344
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:11512
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:7288
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:8808
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:12452
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"2⤵
- Checks computer location settings
PID:624 -
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"5⤵PID:11664
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:7844
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:8744
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:13180
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:9028
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:13884
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:6752
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:10824
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:15628
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:8928
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:13756
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"2⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"4⤵PID:11552
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:7904
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:8736
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:12404
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"2⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:10268
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:14640
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"2⤵PID:6936
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:9752
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"3⤵PID:13956
-
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"2⤵PID:8896
-
-
C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\cc8fbaeab63f0951608a7da11187bdf0_NEIKI.exe"2⤵PID:12476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\danish handjob blowjob several models girly .zip.exe
Filesize1.6MB
MD5edd8585ae47f39ec28e96c4d3607af87
SHA1e0b99e3077767fbba040c88e0e57efdd66b45130
SHA2564d3d36ceadd12803aa558bec2cbb0adda3a089933f1cbd1d031c63cb90b13496
SHA512cdd855c270c8297c5e1be0453a09985e2bfedf374bb49f3016e617d4d4df506dda77269621f25df0936eb1a57090161b23c206162d99f431d3533ae421fca591