Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 08:37
Behavioral task
behavioral1
Sample
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe
-
Size
129KB
-
MD5
b7de84462688cd19db902ace0479afb0
-
SHA1
fd5f86b8c83093248f6e4c565f091f98573dbf3d
-
SHA256
a35068cb5ee30a810f9e3afe469321efa9742c1e1038980919246c8f7f75afaf
-
SHA512
53b79f13aa8b9905ed6722f9d280cf4ae68487f5a0ed8f18c63001f88d7b541bc6a9a000d009662d126f8052c83aa1297608b16aeeb49095193677e6558ee5f9
-
SSDEEP
1536:JxqjQ+P04wsmJCLozkN7ciD+3faCKM5RdJ5R3sozkt5RA3B65MOxqjQ+P04wsmJ+:sr85CLzo7N7k/IB0ur85CL
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta behavioral1/memory/2604-31-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2628-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2800-47-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2760-46-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2460-61-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2588-62-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3032-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2572-77-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2836-92-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2960-91-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1008-106-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2948-107-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2036-122-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1444-121-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE family_neshta behavioral1/memory/2816-144-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2672-145-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1648-159-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2068-158-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2920-177-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1724-176-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/676-189-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/592-188-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/688-204-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2396-203-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1040-220-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1396-219-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/968-232-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1516-233-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2316-245-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1284-246-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2876-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1348-269-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2124-284-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1748-285-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2604-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2632-293-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2752-301-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2568-300-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2800-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2448-310-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2620-325-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2276-324-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2736-334-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2684-333-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3000-341-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2964-342-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3004-349-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3008-350-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2688-358-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1684-357-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/816-366-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2704-365-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2156-373-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2436-374-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2840-381-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1704-382-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1660-389-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exesvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.compid process 1668 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe 2628 svchost.com 2604 B7DE84~1.EXE 2800 svchost.com 2760 B7DE84~1.EXE 2588 svchost.com 2460 B7DE84~1.EXE 2572 svchost.com 3032 B7DE84~1.EXE 2836 svchost.com 2960 B7DE84~1.EXE 2948 svchost.com 1008 B7DE84~1.EXE 2036 svchost.com 1444 B7DE84~1.EXE 2672 svchost.com 2816 B7DE84~1.EXE 1648 svchost.com 2068 B7DE84~1.EXE 2920 svchost.com 1724 B7DE84~1.EXE 676 svchost.com 592 B7DE84~1.EXE 688 svchost.com 2396 B7DE84~1.EXE 1396 svchost.com 1040 B7DE84~1.EXE 1516 svchost.com 968 B7DE84~1.EXE 1284 svchost.com 2316 B7DE84~1.EXE 1348 svchost.com 2876 B7DE84~1.EXE 1748 svchost.com 2124 B7DE84~1.EXE 2632 svchost.com 2604 B7DE84~1.EXE 2752 svchost.com 2568 B7DE84~1.EXE 2800 svchost.com 2448 B7DE84~1.EXE 2620 svchost.com 2276 B7DE84~1.EXE 2736 svchost.com 2684 B7DE84~1.EXE 2964 svchost.com 3000 B7DE84~1.EXE 3008 svchost.com 3004 B7DE84~1.EXE 2688 svchost.com 1684 B7DE84~1.EXE 816 svchost.com 2704 B7DE84~1.EXE 2436 svchost.com 2156 B7DE84~1.EXE 2840 svchost.com 1704 B7DE84~1.EXE 2696 svchost.com 1660 B7DE84~1.EXE 2056 svchost.com 2068 B7DE84~1.EXE 1544 svchost.com 2912 B7DE84~1.EXE 776 svchost.com -
Loads dropped DLL 64 IoCs
Processes:
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exeb7de84462688cd19db902ace0479afb0_NeikiAnalytics.exesvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.compid process 2204 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe 2204 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe 1668 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe 2628 svchost.com 2628 svchost.com 2604 B7DE84~1.EXE 2800 svchost.com 2800 svchost.com 2760 B7DE84~1.EXE 2588 svchost.com 2588 svchost.com 2460 B7DE84~1.EXE 2572 svchost.com 2572 svchost.com 3032 B7DE84~1.EXE 2836 svchost.com 2836 svchost.com 2960 B7DE84~1.EXE 2948 svchost.com 2948 svchost.com 1008 B7DE84~1.EXE 2036 svchost.com 2036 svchost.com 1444 B7DE84~1.EXE 2672 svchost.com 2672 svchost.com 1668 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe 2204 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe 2816 B7DE84~1.EXE 1648 svchost.com 1648 svchost.com 1668 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe 2068 B7DE84~1.EXE 2920 svchost.com 2920 svchost.com 1724 B7DE84~1.EXE 676 svchost.com 676 svchost.com 592 B7DE84~1.EXE 688 svchost.com 688 svchost.com 2396 B7DE84~1.EXE 1396 svchost.com 1396 svchost.com 1668 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe 1040 B7DE84~1.EXE 1516 svchost.com 1516 svchost.com 968 B7DE84~1.EXE 1284 svchost.com 1284 svchost.com 2316 B7DE84~1.EXE 1348 svchost.com 1348 svchost.com 2876 B7DE84~1.EXE 1748 svchost.com 1748 svchost.com 2204 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe 2124 B7DE84~1.EXE 2632 svchost.com 2632 svchost.com 2604 B7DE84~1.EXE 2752 svchost.com 2752 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exeb7de84462688cd19db902ace0479afb0_NeikiAnalytics.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe -
Drops file in Windows directory 64 IoCs
Processes:
B7DE84~1.EXEsvchost.comsvchost.comsvchost.comB7DE84~1.EXEsvchost.comsvchost.comB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEsvchost.comsvchost.comB7DE84~1.EXEB7DE84~1.EXEsvchost.comsvchost.comsvchost.comB7DE84~1.EXEsvchost.comsvchost.comB7DE84~1.EXEsvchost.comsvchost.comsvchost.comB7DE84~1.EXEB7DE84~1.EXEsvchost.comsvchost.comsvchost.comB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEsvchost.comsvchost.comB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comsvchost.comB7DE84~1.EXEB7DE84~1.EXEsvchost.comB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEsvchost.comB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEsvchost.comsvchost.comB7DE84~1.EXEdescription ioc process File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exeb7de84462688cd19db902ace0479afb0_NeikiAnalytics.exesvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEdescription pid process target process PID 2204 wrote to memory of 1668 2204 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe PID 2204 wrote to memory of 1668 2204 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe PID 2204 wrote to memory of 1668 2204 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe PID 2204 wrote to memory of 1668 2204 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe PID 1668 wrote to memory of 2628 1668 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe svchost.com PID 1668 wrote to memory of 2628 1668 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe svchost.com PID 1668 wrote to memory of 2628 1668 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe svchost.com PID 1668 wrote to memory of 2628 1668 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe svchost.com PID 2628 wrote to memory of 2604 2628 svchost.com B7DE84~1.EXE PID 2628 wrote to memory of 2604 2628 svchost.com B7DE84~1.EXE PID 2628 wrote to memory of 2604 2628 svchost.com B7DE84~1.EXE PID 2628 wrote to memory of 2604 2628 svchost.com B7DE84~1.EXE PID 2604 wrote to memory of 2800 2604 B7DE84~1.EXE svchost.com PID 2604 wrote to memory of 2800 2604 B7DE84~1.EXE svchost.com PID 2604 wrote to memory of 2800 2604 B7DE84~1.EXE svchost.com PID 2604 wrote to memory of 2800 2604 B7DE84~1.EXE svchost.com PID 2800 wrote to memory of 2760 2800 svchost.com B7DE84~1.EXE PID 2800 wrote to memory of 2760 2800 svchost.com B7DE84~1.EXE PID 2800 wrote to memory of 2760 2800 svchost.com B7DE84~1.EXE PID 2800 wrote to memory of 2760 2800 svchost.com B7DE84~1.EXE PID 2760 wrote to memory of 2588 2760 B7DE84~1.EXE svchost.com PID 2760 wrote to memory of 2588 2760 B7DE84~1.EXE svchost.com PID 2760 wrote to memory of 2588 2760 B7DE84~1.EXE svchost.com PID 2760 wrote to memory of 2588 2760 B7DE84~1.EXE svchost.com PID 2588 wrote to memory of 2460 2588 svchost.com B7DE84~1.EXE PID 2588 wrote to memory of 2460 2588 svchost.com B7DE84~1.EXE PID 2588 wrote to memory of 2460 2588 svchost.com B7DE84~1.EXE PID 2588 wrote to memory of 2460 2588 svchost.com B7DE84~1.EXE PID 2460 wrote to memory of 2572 2460 B7DE84~1.EXE svchost.com PID 2460 wrote to memory of 2572 2460 B7DE84~1.EXE svchost.com PID 2460 wrote to memory of 2572 2460 B7DE84~1.EXE svchost.com PID 2460 wrote to memory of 2572 2460 B7DE84~1.EXE svchost.com PID 2572 wrote to memory of 3032 2572 svchost.com B7DE84~1.EXE PID 2572 wrote to memory of 3032 2572 svchost.com B7DE84~1.EXE PID 2572 wrote to memory of 3032 2572 svchost.com B7DE84~1.EXE PID 2572 wrote to memory of 3032 2572 svchost.com B7DE84~1.EXE PID 3032 wrote to memory of 2836 3032 B7DE84~1.EXE svchost.com PID 3032 wrote to memory of 2836 3032 B7DE84~1.EXE svchost.com PID 3032 wrote to memory of 2836 3032 B7DE84~1.EXE svchost.com PID 3032 wrote to memory of 2836 3032 B7DE84~1.EXE svchost.com PID 2836 wrote to memory of 2960 2836 svchost.com B7DE84~1.EXE PID 2836 wrote to memory of 2960 2836 svchost.com B7DE84~1.EXE PID 2836 wrote to memory of 2960 2836 svchost.com B7DE84~1.EXE PID 2836 wrote to memory of 2960 2836 svchost.com B7DE84~1.EXE PID 2960 wrote to memory of 2948 2960 B7DE84~1.EXE svchost.com PID 2960 wrote to memory of 2948 2960 B7DE84~1.EXE svchost.com PID 2960 wrote to memory of 2948 2960 B7DE84~1.EXE svchost.com PID 2960 wrote to memory of 2948 2960 B7DE84~1.EXE svchost.com PID 2948 wrote to memory of 1008 2948 svchost.com B7DE84~1.EXE PID 2948 wrote to memory of 1008 2948 svchost.com B7DE84~1.EXE PID 2948 wrote to memory of 1008 2948 svchost.com B7DE84~1.EXE PID 2948 wrote to memory of 1008 2948 svchost.com B7DE84~1.EXE PID 1008 wrote to memory of 2036 1008 B7DE84~1.EXE svchost.com PID 1008 wrote to memory of 2036 1008 B7DE84~1.EXE svchost.com PID 1008 wrote to memory of 2036 1008 B7DE84~1.EXE svchost.com PID 1008 wrote to memory of 2036 1008 B7DE84~1.EXE svchost.com PID 2036 wrote to memory of 1444 2036 svchost.com B7DE84~1.EXE PID 2036 wrote to memory of 1444 2036 svchost.com B7DE84~1.EXE PID 2036 wrote to memory of 1444 2036 svchost.com B7DE84~1.EXE PID 2036 wrote to memory of 1444 2036 svchost.com B7DE84~1.EXE PID 1444 wrote to memory of 2672 1444 B7DE84~1.EXE svchost.com PID 1444 wrote to memory of 2672 1444 B7DE84~1.EXE svchost.com PID 1444 wrote to memory of 2672 1444 B7DE84~1.EXE svchost.com PID 1444 wrote to memory of 2672 1444 B7DE84~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE34⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE36⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE38⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE40⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"41⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE42⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"43⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE44⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"45⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE46⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE48⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"49⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"51⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE52⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"53⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE54⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"55⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"57⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE58⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"59⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE60⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"61⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE62⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"63⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE64⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"65⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE66⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"67⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE68⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"69⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE70⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"71⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE72⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"73⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE74⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"75⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE76⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"77⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE78⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"79⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE80⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"81⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE82⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"83⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE84⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"85⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE86⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"87⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE88⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"89⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE90⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"91⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE92⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"93⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE94⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"95⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE96⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"97⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE98⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"99⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE100⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"101⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE102⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"103⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE104⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"105⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE106⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"107⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE108⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"109⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE110⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"111⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE112⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"113⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE114⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"115⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE116⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"117⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE118⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"119⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE120⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"121⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE122⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"123⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE124⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"125⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE126⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"127⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE128⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"129⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE130⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"131⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE132⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"133⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE134⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"135⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE136⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"137⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE138⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"139⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE140⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"141⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE142⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"143⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE144⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"145⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE146⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"147⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE148⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"149⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE150⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"151⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE152⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"153⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE154⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"155⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE156⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"157⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE158⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"159⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE160⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"161⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE162⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"163⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE164⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"165⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE166⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"167⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE168⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"169⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE170⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"171⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE172⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"173⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE174⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"175⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE176⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"177⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE178⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"179⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE180⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"181⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE182⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"183⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE184⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"185⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE186⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"187⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE188⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"189⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE190⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"191⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE192⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"193⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE194⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"195⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE196⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"197⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE198⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"199⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE200⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"201⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE202⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"203⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE204⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"205⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE206⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"207⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE208⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"209⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE210⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"211⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE212⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"213⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE214⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"215⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE216⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"217⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE218⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"219⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE220⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"221⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE222⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"223⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE224⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"225⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE226⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"227⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE228⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"229⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE230⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"231⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE232⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"233⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE234⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"235⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE236⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"237⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE238⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"239⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE240⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"241⤵