Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 16:13
Behavioral task
behavioral1
Sample
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe
-
Size
743KB
-
MD5
ea1945ffcabaf8e83ed804e7e023a470
-
SHA1
a44f5d65b356640660739a14dcf87eaecd1a978e
-
SHA256
ed3c3aa7f66a97e2d64748237f273cb53b4c0fd1958a79616ea04b71ce967b81
-
SHA512
df84338b6996d1ec86be4f53064456e11fd20b97b7f51d2915bbd1f6a3a5528e1ca39e9ce1f42c720939948f249378abe1f4ef9905ec046ea2fdf5519f974641
-
SSDEEP
12288:Lp19R+7qkoVXJLwOh2NCSVXL93RK2Mhn+6sWtNivMv:Lp1z+7qpVXJ8lCWYh+TcNiK
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta behavioral1/memory/2644-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2792-29-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2632-43-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2448-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2536-57-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2468-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2464-72-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2472-71-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2712-86-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2760-87-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2880-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1600-99-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1880-113-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1524-114-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe family_neshta C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE family_neshta C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe family_neshta behavioral1/memory/2152-146-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1624-147-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2924-161-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1848-160-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/700-177-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2236-178-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/856-195-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1432-197-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/240-205-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1020-204-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2052-213-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1560-214-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/912-227-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/740-226-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3064-241-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1660-242-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2140-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2780-265-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2620-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3060-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2796-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2648-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2448-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2320-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2632-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1892-322-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2664-321-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2740-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3000-330-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1256-337-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2864-338-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2304-346-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2328-345-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/296-353-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1888-354-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1880-361-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1588-362-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1576-370-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exesvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.compid process 2020 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe 2644 svchost.com 2792 EA1945~1.EXE 2448 svchost.com 2632 EA1945~1.EXE 2468 svchost.com 2536 EA1945~1.EXE 2464 svchost.com 2472 EA1945~1.EXE 2712 svchost.com 2760 EA1945~1.EXE 2880 svchost.com 1600 EA1945~1.EXE 1524 svchost.com 1880 EA1945~1.EXE 1624 svchost.com 2152 EA1945~1.EXE 2924 svchost.com 1848 EA1945~1.EXE 2236 svchost.com 700 EA1945~1.EXE 1432 svchost.com 856 EA1945~1.EXE 1020 svchost.com 240 EA1945~1.EXE 1560 svchost.com 2052 EA1945~1.EXE 912 svchost.com 740 EA1945~1.EXE 1660 svchost.com 3064 EA1945~1.EXE 2140 svchost.com 2780 EA1945~1.EXE 3060 svchost.com 2620 EA1945~1.EXE 2796 svchost.com 2648 EA1945~1.EXE 2320 svchost.com 2448 EA1945~1.EXE 2632 svchost.com 2972 EA1945~1.EXE 1892 svchost.com 2664 EA1945~1.EXE 3000 svchost.com 2740 EA1945~1.EXE 2864 svchost.com 1256 EA1945~1.EXE 2304 svchost.com 2328 EA1945~1.EXE 1888 svchost.com 296 EA1945~1.EXE 1880 svchost.com 1588 EA1945~1.EXE 1576 svchost.com 1464 EA1945~1.EXE 860 svchost.com 2156 EA1945~1.EXE 1556 svchost.com 2808 EA1945~1.EXE 2392 svchost.com 2824 EA1945~1.EXE 604 svchost.com 1072 EA1945~1.EXE 2236 svchost.com -
Loads dropped DLL 64 IoCs
Processes:
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.compid process 2036 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe 2036 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe 2644 svchost.com 2644 svchost.com 2448 svchost.com 2448 svchost.com 2468 svchost.com 2468 svchost.com 2464 svchost.com 2464 svchost.com 2712 svchost.com 2712 svchost.com 2880 svchost.com 2880 svchost.com 1524 svchost.com 1524 svchost.com 1624 svchost.com 1624 svchost.com 2020 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe 2036 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe 2036 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe 2924 svchost.com 2924 svchost.com 2236 svchost.com 2236 svchost.com 1432 svchost.com 1432 svchost.com 2036 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe 1020 svchost.com 1020 svchost.com 1560 svchost.com 1560 svchost.com 912 svchost.com 912 svchost.com 1660 svchost.com 1660 svchost.com 2140 svchost.com 2140 svchost.com 3060 svchost.com 3060 svchost.com 2796 svchost.com 2796 svchost.com 2320 svchost.com 2320 svchost.com 2632 svchost.com 2632 svchost.com 1892 svchost.com 1892 svchost.com 3000 svchost.com 3000 svchost.com 2864 svchost.com 2864 svchost.com 2304 svchost.com 2304 svchost.com 1888 svchost.com 1888 svchost.com 1880 svchost.com 1880 svchost.com 1576 svchost.com 1576 svchost.com 860 svchost.com 860 svchost.com 1556 svchost.com 1556 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exeea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe -
Drops file in Windows directory 64 IoCs
Processes:
EA1945~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEEA1945~1.EXEsvchost.comsvchost.comEA1945~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comEA1945~1.EXEEA1945~1.EXEsvchost.comsvchost.comsvchost.comEA1945~1.EXEsvchost.comsvchost.comEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comEA1945~1.EXEEA1945~1.EXEsvchost.comEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEsvchost.comsvchost.comEA1945~1.EXEEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comEA1945~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comEA1945~1.EXEEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comsvchost.comEA1945~1.EXEEA1945~1.EXEdescription ioc process File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exeea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exesvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEdescription pid process target process PID 2036 wrote to memory of 2020 2036 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe PID 2036 wrote to memory of 2020 2036 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe PID 2036 wrote to memory of 2020 2036 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe PID 2036 wrote to memory of 2020 2036 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe PID 2020 wrote to memory of 2644 2020 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe svchost.com PID 2020 wrote to memory of 2644 2020 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe svchost.com PID 2020 wrote to memory of 2644 2020 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe svchost.com PID 2020 wrote to memory of 2644 2020 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe svchost.com PID 2644 wrote to memory of 2792 2644 svchost.com EA1945~1.EXE PID 2644 wrote to memory of 2792 2644 svchost.com EA1945~1.EXE PID 2644 wrote to memory of 2792 2644 svchost.com EA1945~1.EXE PID 2644 wrote to memory of 2792 2644 svchost.com EA1945~1.EXE PID 2792 wrote to memory of 2448 2792 EA1945~1.EXE svchost.com PID 2792 wrote to memory of 2448 2792 EA1945~1.EXE svchost.com PID 2792 wrote to memory of 2448 2792 EA1945~1.EXE svchost.com PID 2792 wrote to memory of 2448 2792 EA1945~1.EXE svchost.com PID 2448 wrote to memory of 2632 2448 svchost.com EA1945~1.EXE PID 2448 wrote to memory of 2632 2448 svchost.com EA1945~1.EXE PID 2448 wrote to memory of 2632 2448 svchost.com EA1945~1.EXE PID 2448 wrote to memory of 2632 2448 svchost.com EA1945~1.EXE PID 2632 wrote to memory of 2468 2632 EA1945~1.EXE svchost.com PID 2632 wrote to memory of 2468 2632 EA1945~1.EXE svchost.com PID 2632 wrote to memory of 2468 2632 EA1945~1.EXE svchost.com PID 2632 wrote to memory of 2468 2632 EA1945~1.EXE svchost.com PID 2468 wrote to memory of 2536 2468 svchost.com EA1945~1.EXE PID 2468 wrote to memory of 2536 2468 svchost.com EA1945~1.EXE PID 2468 wrote to memory of 2536 2468 svchost.com EA1945~1.EXE PID 2468 wrote to memory of 2536 2468 svchost.com EA1945~1.EXE PID 2536 wrote to memory of 2464 2536 EA1945~1.EXE svchost.com PID 2536 wrote to memory of 2464 2536 EA1945~1.EXE svchost.com PID 2536 wrote to memory of 2464 2536 EA1945~1.EXE svchost.com PID 2536 wrote to memory of 2464 2536 EA1945~1.EXE svchost.com PID 2464 wrote to memory of 2472 2464 svchost.com EA1945~1.EXE PID 2464 wrote to memory of 2472 2464 svchost.com EA1945~1.EXE PID 2464 wrote to memory of 2472 2464 svchost.com EA1945~1.EXE PID 2464 wrote to memory of 2472 2464 svchost.com EA1945~1.EXE PID 2472 wrote to memory of 2712 2472 EA1945~1.EXE svchost.com PID 2472 wrote to memory of 2712 2472 EA1945~1.EXE svchost.com PID 2472 wrote to memory of 2712 2472 EA1945~1.EXE svchost.com PID 2472 wrote to memory of 2712 2472 EA1945~1.EXE svchost.com PID 2712 wrote to memory of 2760 2712 svchost.com EA1945~1.EXE PID 2712 wrote to memory of 2760 2712 svchost.com EA1945~1.EXE PID 2712 wrote to memory of 2760 2712 svchost.com EA1945~1.EXE PID 2712 wrote to memory of 2760 2712 svchost.com EA1945~1.EXE PID 2760 wrote to memory of 2880 2760 EA1945~1.EXE svchost.com PID 2760 wrote to memory of 2880 2760 EA1945~1.EXE svchost.com PID 2760 wrote to memory of 2880 2760 EA1945~1.EXE svchost.com PID 2760 wrote to memory of 2880 2760 EA1945~1.EXE svchost.com PID 2880 wrote to memory of 1600 2880 svchost.com EA1945~1.EXE PID 2880 wrote to memory of 1600 2880 svchost.com EA1945~1.EXE PID 2880 wrote to memory of 1600 2880 svchost.com EA1945~1.EXE PID 2880 wrote to memory of 1600 2880 svchost.com EA1945~1.EXE PID 1600 wrote to memory of 1524 1600 EA1945~1.EXE svchost.com PID 1600 wrote to memory of 1524 1600 EA1945~1.EXE svchost.com PID 1600 wrote to memory of 1524 1600 EA1945~1.EXE svchost.com PID 1600 wrote to memory of 1524 1600 EA1945~1.EXE svchost.com PID 1524 wrote to memory of 1880 1524 svchost.com svchost.com PID 1524 wrote to memory of 1880 1524 svchost.com svchost.com PID 1524 wrote to memory of 1880 1524 svchost.com svchost.com PID 1524 wrote to memory of 1880 1524 svchost.com svchost.com PID 1880 wrote to memory of 1624 1880 EA1945~1.EXE svchost.com PID 1880 wrote to memory of 1624 1880 EA1945~1.EXE svchost.com PID 1880 wrote to memory of 1624 1880 EA1945~1.EXE svchost.com PID 1880 wrote to memory of 1624 1880 EA1945~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE18⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE20⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE22⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE24⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE26⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE28⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE30⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE32⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE34⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE36⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE38⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE40⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE42⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE44⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE46⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE48⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE50⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE52⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE54⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE56⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE58⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"59⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE60⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"61⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE62⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE64⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE66⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"67⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE68⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"69⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE70⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"71⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE72⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"73⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE74⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"75⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE76⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"77⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE78⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"79⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE80⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"81⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE82⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"83⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE84⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"85⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE86⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"87⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE88⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"89⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE90⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"91⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE92⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"93⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE94⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"95⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE96⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"97⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE98⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"99⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE100⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"101⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE102⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"103⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE104⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"105⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE106⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"107⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE108⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"109⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE110⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"111⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE112⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"113⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE114⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"115⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE116⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"117⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE118⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"119⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE120⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"121⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE122⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"123⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE124⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"125⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE126⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"127⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE128⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"129⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE130⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"131⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE132⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"133⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE134⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"135⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE136⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"137⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE138⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"139⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE140⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"141⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE142⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"143⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE144⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"145⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE146⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"147⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE148⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"149⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE150⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"151⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE152⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"153⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE154⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"155⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE156⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"157⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE158⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"159⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE160⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"161⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE162⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"163⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE164⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"165⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE166⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"167⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE168⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"169⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE170⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"171⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE172⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"173⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE174⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"175⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE176⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"177⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE178⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"179⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE180⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"181⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE182⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"183⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE184⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"185⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE186⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"187⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE188⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"189⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE190⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"191⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE192⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"193⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE194⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"195⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE196⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"197⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE198⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"199⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE200⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"201⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE202⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"203⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE204⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"205⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE206⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"207⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE208⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"209⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE210⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"211⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE212⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"213⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE214⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"215⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE216⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"217⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE218⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"219⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE220⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"221⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE222⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"223⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE224⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"225⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE226⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"227⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE228⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"229⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE230⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"231⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE232⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"233⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE234⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"235⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE236⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"237⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE238⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"239⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE240⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"241⤵