Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 08:37
Behavioral task
behavioral1
Sample
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe
-
Size
129KB
-
MD5
b7de84462688cd19db902ace0479afb0
-
SHA1
fd5f86b8c83093248f6e4c565f091f98573dbf3d
-
SHA256
a35068cb5ee30a810f9e3afe469321efa9742c1e1038980919246c8f7f75afaf
-
SHA512
53b79f13aa8b9905ed6722f9d280cf4ae68487f5a0ed8f18c63001f88d7b541bc6a9a000d009662d126f8052c83aa1297608b16aeeb49095193677e6558ee5f9
-
SSDEEP
1536:JxqjQ+P04wsmJCLozkN7ciD+3faCKM5RdJ5R3sozkt5RA3B65MOxqjQ+P04wsmJ+:sr85CLzo7N7k/IB0ur85CL
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe family_neshta C:\Windows\svchost.com family_neshta behavioral2/memory/3292-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4724-26-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/432-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4404-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5012-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1500-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4624-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4172-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3312-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3724-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/644-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3380-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2436-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4816-92-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE family_neshta behavioral2/memory/1360-122-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe family_neshta C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe family_neshta behavioral2/memory/840-137-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE family_neshta C:\PROGRA~2\Google\Update\DISABL~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\msedgewebview2.exe family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\INSTAL~1\setup.exe family_neshta C:\PROGRA~2\MICROS~1\EdgeCore\124024~1.80\PWAHEL~1.EXE family_neshta C:\PROGRA~2\MICROS~1\EdgeCore\124024~1.80\NOTIFI~1.EXE family_neshta C:\PROGRA~2\MICROS~1\EdgeCore\124024~1.80\MSEDGE~2.EXE family_neshta C:\PROGRA~2\MICROS~1\EdgeCore\124024~1.80\msedge.exe family_neshta C:\PROGRA~2\MICROS~1\EdgeCore\124024~1.80\COOKIE~1.EXE family_neshta C:\PROGRA~2\MICROS~1\EdgeCore\124024~1.80\BHO\IE_TO_~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\identity_helper.exe family_neshta behavioral2/memory/1056-226-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1248-237-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\elevation_service.exe family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE family_neshta C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\java.exe family_neshta behavioral2/memory/808-240-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE family_neshta behavioral2/memory/2360-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1512-248-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1664-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3312-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/212-263-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1628-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1136-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3840-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4832-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2576-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4772-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3716-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1360-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1884-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1196-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4384-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3100-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2412-312-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
B7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEb7de84462688cd19db902ace0479afb0_NeikiAnalytics.exeB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation B7DE84~1.EXE -
Executes dropped EXE 64 IoCs
Processes:
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exesvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.compid process 624 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe 3292 svchost.com 4724 B7DE84~1.EXE 432 svchost.com 4404 B7DE84~1.EXE 5012 svchost.com 1500 B7DE84~1.EXE 4624 svchost.com 4172 B7DE84~1.EXE 3312 svchost.com 3724 B7DE84~1.EXE 644 svchost.com 3380 B7DE84~1.EXE 2436 svchost.com 4816 B7DE84~1.EXE 1360 svchost.com 840 B7DE84~1.EXE 1056 svchost.com 1248 B7DE84~1.EXE 808 svchost.com 2360 B7DE84~1.EXE 1512 svchost.com 1664 B7DE84~1.EXE 3312 svchost.com 212 B7DE84~1.EXE 1628 svchost.com 1136 B7DE84~1.EXE 3840 svchost.com 4832 B7DE84~1.EXE 2576 svchost.com 4772 B7DE84~1.EXE 3716 svchost.com 1360 B7DE84~1.EXE 1884 svchost.com 1196 B7DE84~1.EXE 4384 svchost.com 3100 B7DE84~1.EXE 2412 svchost.com 4020 B7DE84~1.EXE 3764 svchost.com 1972 B7DE84~1.EXE 4584 svchost.com 3940 B7DE84~1.EXE 3500 svchost.com 1392 B7DE84~1.EXE 452 svchost.com 4828 B7DE84~1.EXE 3320 svchost.com 212 B7DE84~1.EXE 1904 svchost.com 3380 B7DE84~1.EXE 436 svchost.com 2428 B7DE84~1.EXE 4376 svchost.com 1608 B7DE84~1.EXE 2572 svchost.com 2292 B7DE84~1.EXE 4900 svchost.com 4320 B7DE84~1.EXE 2112 svchost.com 3924 B7DE84~1.EXE 1688 svchost.com 4720 B7DE84~1.EXE 2720 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
Processes:
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exeB7DE84~1.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" B7DE84~1.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exeb7de84462688cd19db902ace0479afb0_NeikiAnalytics.exeB7DE84~1.EXEdescription ioc process File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\notification_helper.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MI391D~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaw.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe B7DE84~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\msedge_proxy.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe B7DE84~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\cookie_exporter.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\cookie_exporter.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\identity_helper.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~3.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\notification_helper.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~3.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe B7DE84~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe B7DE84~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\pwahelper.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe B7DE84~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\msedge_pwa_launcher.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\msedge.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\msedge_proxy.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe B7DE84~1.EXE -
Drops file in Windows directory 64 IoCs
Processes:
svchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comB7DE84~1.EXEsvchost.comsvchost.comsvchost.comB7DE84~1.EXEB7DE84~1.EXEsvchost.comsvchost.comB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comsvchost.comB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEsvchost.comsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEB7DE84~1.EXEsvchost.comsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEsvchost.comsvchost.comdescription ioc process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\svchost.com B7DE84~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
Processes:
B7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEb7de84462688cd19db902ace0479afb0_NeikiAnalytics.exeB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEB7DE84~1.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings B7DE84~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exeb7de84462688cd19db902ace0479afb0_NeikiAnalytics.exesvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEsvchost.comB7DE84~1.EXEdescription pid process target process PID 5068 wrote to memory of 624 5068 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe PID 5068 wrote to memory of 624 5068 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe PID 5068 wrote to memory of 624 5068 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe PID 624 wrote to memory of 3292 624 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe svchost.com PID 624 wrote to memory of 3292 624 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe svchost.com PID 624 wrote to memory of 3292 624 b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe svchost.com PID 3292 wrote to memory of 4724 3292 svchost.com B7DE84~1.EXE PID 3292 wrote to memory of 4724 3292 svchost.com B7DE84~1.EXE PID 3292 wrote to memory of 4724 3292 svchost.com B7DE84~1.EXE PID 4724 wrote to memory of 432 4724 B7DE84~1.EXE svchost.com PID 4724 wrote to memory of 432 4724 B7DE84~1.EXE svchost.com PID 4724 wrote to memory of 432 4724 B7DE84~1.EXE svchost.com PID 432 wrote to memory of 4404 432 svchost.com B7DE84~1.EXE PID 432 wrote to memory of 4404 432 svchost.com B7DE84~1.EXE PID 432 wrote to memory of 4404 432 svchost.com B7DE84~1.EXE PID 4404 wrote to memory of 5012 4404 B7DE84~1.EXE svchost.com PID 4404 wrote to memory of 5012 4404 B7DE84~1.EXE svchost.com PID 4404 wrote to memory of 5012 4404 B7DE84~1.EXE svchost.com PID 5012 wrote to memory of 1500 5012 svchost.com B7DE84~1.EXE PID 5012 wrote to memory of 1500 5012 svchost.com B7DE84~1.EXE PID 5012 wrote to memory of 1500 5012 svchost.com B7DE84~1.EXE PID 1500 wrote to memory of 4624 1500 B7DE84~1.EXE B7DE84~1.EXE PID 1500 wrote to memory of 4624 1500 B7DE84~1.EXE B7DE84~1.EXE PID 1500 wrote to memory of 4624 1500 B7DE84~1.EXE B7DE84~1.EXE PID 4624 wrote to memory of 4172 4624 svchost.com B7DE84~1.EXE PID 4624 wrote to memory of 4172 4624 svchost.com B7DE84~1.EXE PID 4624 wrote to memory of 4172 4624 svchost.com B7DE84~1.EXE PID 4172 wrote to memory of 3312 4172 B7DE84~1.EXE svchost.com PID 4172 wrote to memory of 3312 4172 B7DE84~1.EXE svchost.com PID 4172 wrote to memory of 3312 4172 B7DE84~1.EXE svchost.com PID 3312 wrote to memory of 3724 3312 svchost.com B7DE84~1.EXE PID 3312 wrote to memory of 3724 3312 svchost.com B7DE84~1.EXE PID 3312 wrote to memory of 3724 3312 svchost.com B7DE84~1.EXE PID 3724 wrote to memory of 644 3724 B7DE84~1.EXE B7DE84~1.EXE PID 3724 wrote to memory of 644 3724 B7DE84~1.EXE B7DE84~1.EXE PID 3724 wrote to memory of 644 3724 B7DE84~1.EXE B7DE84~1.EXE PID 644 wrote to memory of 3380 644 svchost.com B7DE84~1.EXE PID 644 wrote to memory of 3380 644 svchost.com B7DE84~1.EXE PID 644 wrote to memory of 3380 644 svchost.com B7DE84~1.EXE PID 3380 wrote to memory of 2436 3380 B7DE84~1.EXE Conhost.exe PID 3380 wrote to memory of 2436 3380 B7DE84~1.EXE Conhost.exe PID 3380 wrote to memory of 2436 3380 B7DE84~1.EXE Conhost.exe PID 2436 wrote to memory of 4816 2436 svchost.com B7DE84~1.EXE PID 2436 wrote to memory of 4816 2436 svchost.com B7DE84~1.EXE PID 2436 wrote to memory of 4816 2436 svchost.com B7DE84~1.EXE PID 4816 wrote to memory of 1360 4816 B7DE84~1.EXE svchost.com PID 4816 wrote to memory of 1360 4816 B7DE84~1.EXE svchost.com PID 4816 wrote to memory of 1360 4816 B7DE84~1.EXE svchost.com PID 1360 wrote to memory of 840 1360 svchost.com B7DE84~1.EXE PID 1360 wrote to memory of 840 1360 svchost.com B7DE84~1.EXE PID 1360 wrote to memory of 840 1360 svchost.com B7DE84~1.EXE PID 840 wrote to memory of 1056 840 B7DE84~1.EXE svchost.com PID 840 wrote to memory of 1056 840 B7DE84~1.EXE svchost.com PID 840 wrote to memory of 1056 840 B7DE84~1.EXE svchost.com PID 1056 wrote to memory of 1248 1056 svchost.com B7DE84~1.EXE PID 1056 wrote to memory of 1248 1056 svchost.com B7DE84~1.EXE PID 1056 wrote to memory of 1248 1056 svchost.com B7DE84~1.EXE PID 1248 wrote to memory of 808 1248 B7DE84~1.EXE svchost.com PID 1248 wrote to memory of 808 1248 B7DE84~1.EXE svchost.com PID 1248 wrote to memory of 808 1248 B7DE84~1.EXE svchost.com PID 808 wrote to memory of 2360 808 svchost.com svchost.com PID 808 wrote to memory of 2360 808 svchost.com svchost.com PID 808 wrote to memory of 2360 808 svchost.com svchost.com PID 2360 wrote to memory of 1512 2360 B7DE84~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\b7de84462688cd19db902ace0479afb0_NeikiAnalytics.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"19⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"23⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"25⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE26⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"27⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"29⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE30⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"31⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE32⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"33⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"35⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE36⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"37⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE38⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"39⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE40⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE42⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"43⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE44⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"45⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE46⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"47⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"49⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE50⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"51⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE52⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"53⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"57⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE58⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"59⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"61⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE62⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"63⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE64⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"65⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE66⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"67⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE68⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"69⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE70⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"71⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE72⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"73⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE74⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"75⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE76⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"77⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE78⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"79⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE80⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"81⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE82⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"83⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE84⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"85⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE86⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"87⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE88⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"89⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE90⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"91⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE92⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"93⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE94⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"95⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE96⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"97⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE98⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"99⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE100⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"101⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE102⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"103⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE104⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"105⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE106⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"107⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE108⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"109⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE110⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"111⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE112⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"113⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE114⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"115⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE116⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"117⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE118⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"119⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE120⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"121⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE122⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"123⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE124⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"125⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE126⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"127⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE128⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"129⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE130⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"131⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE132⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"133⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE134⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"135⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE136⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"137⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE138⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"139⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE140⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"141⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE142⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"143⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE144⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"145⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE146⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"147⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE148⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"149⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE150⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"151⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE152⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"153⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE154⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"155⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE156⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"157⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE158⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"159⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE160⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"161⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE162⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"163⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE164⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"165⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE166⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"167⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE168⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"169⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE170⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"171⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE172⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"173⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE174⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"175⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE176⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"177⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE178⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"179⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE180⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"181⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE182⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"183⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE184⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"185⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE186⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"187⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE188⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"189⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE190⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"191⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE192⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"193⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE194⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"195⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE196⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"197⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE198⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"199⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE200⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"201⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE202⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"203⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE204⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"205⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE206⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"207⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE208⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"209⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE210⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"211⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE212⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"213⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE214⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"215⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE216⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"217⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE218⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"219⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE220⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"221⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE222⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"223⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE224⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"225⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE226⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"227⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE228⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"229⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE230⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"231⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE232⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"233⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE234⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"235⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE236⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"237⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE238⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"239⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE240⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7DE84~1.EXE"241⤵