Analysis
-
max time kernel
128s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 16:13
Behavioral task
behavioral1
Sample
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe
-
Size
743KB
-
MD5
ea1945ffcabaf8e83ed804e7e023a470
-
SHA1
a44f5d65b356640660739a14dcf87eaecd1a978e
-
SHA256
ed3c3aa7f66a97e2d64748237f273cb53b4c0fd1958a79616ea04b71ce967b81
-
SHA512
df84338b6996d1ec86be4f53064456e11fd20b97b7f51d2915bbd1f6a3a5528e1ca39e9ce1f42c720939948f249378abe1f4ef9905ec046ea2fdf5519f974641
-
SSDEEP
12288:Lp19R+7qkoVXJLwOh2NCSVXL93RK2Mhn+6sWtNivMv:Lp1z+7qpVXJ8lCWYh+TcNiK
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe family_neshta C:\Windows\svchost.com family_neshta behavioral2/memory/3916-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/32-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/376-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4776-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3152-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2420-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2396-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3576-62-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4444-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2060-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/760-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3504-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3612-90-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4352-105-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE family_neshta behavioral2/memory/1128-124-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2268-134-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1584-136-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1292-146-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1956-148-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2520-160-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe family_neshta C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE family_neshta C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe family_neshta C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaw.exe family_neshta C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe family_neshta C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\java.exe family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe family_neshta C:\PROGRA~2\MICROS~1\EDGEUP~1\Install\{97D61~1\MicrosoftEdgeUpdateSetup_X86_1.3.187.37.exe family_neshta behavioral2/memory/2076-228-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1756-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE family_neshta C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE family_neshta C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE family_neshta behavioral2/memory/3856-254-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5004-261-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3444-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1176-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3152-276-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4136-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/824-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2464-291-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4444-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3460-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4692-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/928-307-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3504-313-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3456-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4628-321-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/640-328-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/440-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1128-331-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4120-337-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1584-339-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4672-345-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3892-352-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3464-353-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1836-355-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4448-361-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exeEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EA1945~1.EXE -
Executes dropped EXE 64 IoCs
Processes:
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exesvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.compid process 1156 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe 3916 svchost.com 32 EA1945~1.EXE 376 svchost.com 4776 EA1945~1.EXE 3152 svchost.com 2420 EA1945~1.EXE 2396 svchost.com 3576 EA1945~1.EXE 4444 svchost.com 2060 EA1945~1.EXE 760 svchost.com 3504 EA1945~1.EXE 3612 svchost.com 4352 EA1945~1.EXE 1128 svchost.com 2268 EA1945~1.EXE 1584 svchost.com 1292 EA1945~1.EXE 1956 svchost.com 2520 EA1945~1.EXE 2076 svchost.com 1756 EA1945~1.EXE 3856 svchost.com 5004 EA1945~1.EXE 3444 svchost.com 1176 EA1945~1.EXE 3152 svchost.com 4136 EA1945~1.EXE 824 svchost.com 2464 EA1945~1.EXE 4444 svchost.com 3460 EA1945~1.EXE 4692 svchost.com 928 EA1945~1.EXE 3504 svchost.com 3456 EA1945~1.EXE 4628 svchost.com 640 EA1945~1.EXE 440 svchost.com 1128 EA1945~1.EXE 4120 svchost.com 1584 EA1945~1.EXE 4672 svchost.com 3892 EA1945~1.EXE 3464 svchost.com 1836 EA1945~1.EXE 4448 svchost.com 3244 EA1945~1.EXE 3960 svchost.com 2936 EA1945~1.EXE 3208 svchost.com 1876 EA1945~1.EXE 4416 svchost.com 1092 EA1945~1.EXE 4432 svchost.com 572 EA1945~1.EXE 4372 svchost.com 1792 EA1945~1.EXE 3644 svchost.com 1232 EA1945~1.EXE 3404 svchost.com 3260 EA1945~1.EXE 2600 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exeea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exedescription ioc process File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MIA062~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MI9C33~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~4.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~3.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe -
Drops file in Windows directory 64 IoCs
Processes:
EA1945~1.EXEsvchost.comsvchost.comEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEsvchost.comsvchost.comEA1945~1.EXEsvchost.comsvchost.comEA1945~1.EXEEA1945~1.EXEsvchost.comsvchost.comEA1945~1.EXEEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comsvchost.comEA1945~1.EXEEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEEA1945~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comEA1945~1.EXEsvchost.comsvchost.comsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEEA1945~1.EXEsvchost.comEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEsvchost.comsvchost.comsvchost.comEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEsvchost.comEA1945~1.EXEEA1945~1.EXEsvchost.comsvchost.comEA1945~1.EXEdescription ioc process File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\directx.sys EA1945~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com EA1945~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com EA1945~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
Processes:
EA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEEA1945~1.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings EA1945~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exeea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exesvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEsvchost.comEA1945~1.EXEdescription pid process target process PID 3204 wrote to memory of 1156 3204 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe PID 3204 wrote to memory of 1156 3204 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe PID 3204 wrote to memory of 1156 3204 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe PID 1156 wrote to memory of 3916 1156 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe svchost.com PID 1156 wrote to memory of 3916 1156 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe svchost.com PID 1156 wrote to memory of 3916 1156 ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe svchost.com PID 3916 wrote to memory of 32 3916 svchost.com EA1945~1.EXE PID 3916 wrote to memory of 32 3916 svchost.com EA1945~1.EXE PID 3916 wrote to memory of 32 3916 svchost.com EA1945~1.EXE PID 32 wrote to memory of 376 32 EA1945~1.EXE svchost.com PID 32 wrote to memory of 376 32 EA1945~1.EXE svchost.com PID 32 wrote to memory of 376 32 EA1945~1.EXE svchost.com PID 376 wrote to memory of 4776 376 svchost.com EA1945~1.EXE PID 376 wrote to memory of 4776 376 svchost.com EA1945~1.EXE PID 376 wrote to memory of 4776 376 svchost.com EA1945~1.EXE PID 4776 wrote to memory of 3152 4776 EA1945~1.EXE svchost.com PID 4776 wrote to memory of 3152 4776 EA1945~1.EXE svchost.com PID 4776 wrote to memory of 3152 4776 EA1945~1.EXE svchost.com PID 3152 wrote to memory of 2420 3152 svchost.com EA1945~1.EXE PID 3152 wrote to memory of 2420 3152 svchost.com EA1945~1.EXE PID 3152 wrote to memory of 2420 3152 svchost.com EA1945~1.EXE PID 2420 wrote to memory of 2396 2420 EA1945~1.EXE svchost.com PID 2420 wrote to memory of 2396 2420 EA1945~1.EXE svchost.com PID 2420 wrote to memory of 2396 2420 EA1945~1.EXE svchost.com PID 2396 wrote to memory of 3576 2396 svchost.com EA1945~1.EXE PID 2396 wrote to memory of 3576 2396 svchost.com EA1945~1.EXE PID 2396 wrote to memory of 3576 2396 svchost.com EA1945~1.EXE PID 3576 wrote to memory of 4444 3576 EA1945~1.EXE svchost.com PID 3576 wrote to memory of 4444 3576 EA1945~1.EXE svchost.com PID 3576 wrote to memory of 4444 3576 EA1945~1.EXE svchost.com PID 4444 wrote to memory of 2060 4444 svchost.com EA1945~1.EXE PID 4444 wrote to memory of 2060 4444 svchost.com EA1945~1.EXE PID 4444 wrote to memory of 2060 4444 svchost.com EA1945~1.EXE PID 2060 wrote to memory of 760 2060 EA1945~1.EXE svchost.com PID 2060 wrote to memory of 760 2060 EA1945~1.EXE svchost.com PID 2060 wrote to memory of 760 2060 EA1945~1.EXE svchost.com PID 760 wrote to memory of 3504 760 svchost.com svchost.com PID 760 wrote to memory of 3504 760 svchost.com svchost.com PID 760 wrote to memory of 3504 760 svchost.com svchost.com PID 3504 wrote to memory of 3612 3504 EA1945~1.EXE svchost.com PID 3504 wrote to memory of 3612 3504 EA1945~1.EXE svchost.com PID 3504 wrote to memory of 3612 3504 EA1945~1.EXE svchost.com PID 3612 wrote to memory of 4352 3612 svchost.com EA1945~1.EXE PID 3612 wrote to memory of 4352 3612 svchost.com EA1945~1.EXE PID 3612 wrote to memory of 4352 3612 svchost.com EA1945~1.EXE PID 4352 wrote to memory of 1128 4352 EA1945~1.EXE EA1945~1.EXE PID 4352 wrote to memory of 1128 4352 EA1945~1.EXE EA1945~1.EXE PID 4352 wrote to memory of 1128 4352 EA1945~1.EXE EA1945~1.EXE PID 1128 wrote to memory of 2268 1128 svchost.com EA1945~1.EXE PID 1128 wrote to memory of 2268 1128 svchost.com EA1945~1.EXE PID 1128 wrote to memory of 2268 1128 svchost.com EA1945~1.EXE PID 2268 wrote to memory of 1584 2268 EA1945~1.EXE EA1945~1.EXE PID 2268 wrote to memory of 1584 2268 EA1945~1.EXE EA1945~1.EXE PID 2268 wrote to memory of 1584 2268 EA1945~1.EXE EA1945~1.EXE PID 1584 wrote to memory of 1292 1584 svchost.com EA1945~1.EXE PID 1584 wrote to memory of 1292 1584 svchost.com EA1945~1.EXE PID 1584 wrote to memory of 1292 1584 svchost.com EA1945~1.EXE PID 1292 wrote to memory of 1956 1292 EA1945~1.EXE svchost.com PID 1292 wrote to memory of 1956 1292 EA1945~1.EXE svchost.com PID 1292 wrote to memory of 1956 1292 EA1945~1.EXE svchost.com PID 1956 wrote to memory of 2520 1956 svchost.com EA1945~1.EXE PID 1956 wrote to memory of 2520 1956 svchost.com EA1945~1.EXE PID 1956 wrote to memory of 2520 1956 svchost.com EA1945~1.EXE PID 2520 wrote to memory of 2076 2520 EA1945~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\ea1945ffcabaf8e83ed804e7e023a470_NeikiAnalytics.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE8⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE22⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"23⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"25⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE26⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"27⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"29⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE30⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"33⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"35⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE36⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"37⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE38⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"39⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE40⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE42⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"43⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE44⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"45⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE46⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"47⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"49⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"51⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"53⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"55⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"57⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"59⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE60⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"61⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE62⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"65⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE66⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"67⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE68⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"69⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE70⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"71⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE72⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"73⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE74⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"75⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE76⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"77⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE78⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"79⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE80⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"81⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE82⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"83⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE84⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"85⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE86⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"87⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE88⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"89⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE90⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"91⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE92⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"93⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE94⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"95⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE96⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"97⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE98⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"99⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE100⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"101⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE102⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"103⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE104⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"105⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE106⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"107⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE108⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"109⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE110⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"111⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE112⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"113⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE114⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"115⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE116⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"117⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE118⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"119⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE120⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"121⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE122⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"123⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE124⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"125⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE126⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"127⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE128⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"129⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE130⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"131⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE132⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"133⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE134⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"135⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE136⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"137⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE138⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"139⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE140⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"141⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE142⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"143⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE144⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"145⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE146⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"147⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE148⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"149⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE150⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"151⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE152⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"153⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE154⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"155⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE156⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"157⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE158⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"159⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE160⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"161⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE162⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"163⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE164⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"165⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE166⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"167⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE168⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"169⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE170⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"171⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE172⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"173⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE174⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"175⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE176⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"177⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE178⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"179⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE180⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"181⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE182⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"183⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE184⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"185⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE186⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"187⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE188⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"189⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE190⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"191⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE192⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"193⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE194⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"195⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE196⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"197⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE198⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"199⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE200⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"201⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE202⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"203⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE204⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"205⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE206⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"207⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE208⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"209⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE210⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"211⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE212⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"213⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE214⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"215⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE216⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"217⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE218⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"219⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE220⤵
- Checks computer location settings
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"221⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE222⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"223⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE224⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"225⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE226⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"227⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE228⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"229⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE230⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"231⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE232⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"233⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE234⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"235⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE236⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"237⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE238⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"239⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE240⤵
- Modifies registry class
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EA1945~1.EXE"241⤵