Analysis Overview
SHA256
edd1776d51dc7b82153c41c5870afe1508dedbdd03994274d9d4f2deeef8fe8a
Threat Level: Known bad
The file 240613mhrwhsyfjrpwinfected.zip was found to be: Known bad.
Malicious Activity Summary
Detect Neshta payload
Neshta family
Neshta
Loads dropped DLL
Modifies system executable filetype association
Executes dropped EXE
Reads user/profile data of web browsers
Checks computer location settings
Drops file in Program Files directory
Drops file in Windows directory
Enumerates physical storage devices
Unsigned PE
Modifies registry class
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-15 17:36
Signatures
Detect Neshta payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Neshta family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-15 17:36
Reported
2024-06-15 17:39
Platform
win7-20240611-en
Max time kernel
120s
Max time network
120s
Command Line
Signatures
Detect Neshta payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Neshta
Executes dropped EXE
Loads dropped DLL
Modifies system executable filetype association
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Local\Temp\747dd5a520297697c280a00436847460_NeikiAnalytics.exe | N/A |
Reads user/profile data of web browsers
Drops file in Program Files directory
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Local\Temp\747dd5a520297697c280a00436847460_NeikiAnalytics.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\747dd5a520297697c280a00436847460_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\747dd5a520297697c280a00436847460_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Local\Temp\3582-490\747dd5a520297697c280a00436847460_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\3582-490\747dd5a520297697c280a00436847460_NeikiAnalytics.exe"
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "-9341885721375828001168615724042969447728387360419817070911392380412-1352215634"
Network
Files
\Users\Admin\AppData\Local\Temp\3582-490\747dd5a520297697c280a00436847460_NeikiAnalytics.exe
| MD5 | 1df5bef57c72b8d23f5263046e5dd043 |
| SHA1 | 68e859eca519f8f5cc1c9ceb3dfaaac87e17b544 |
| SHA256 | 43bb08a4762778843eca24c57d61f854a3c4a21f4da9f6bb15a34764a07596f3 |
| SHA512 | 4bee5ae57f39b842c481280ac98c75106ed41aa34b783c2967a705511268fe2a4a2a489386c9b5bd2d291454989b9d7f7d644ef36300ca9feada4f016c592332 |
C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe
| MD5 | cf6c595d3e5e9667667af096762fd9c4 |
| SHA1 | 9bb44da8d7f6457099cb56e4f7d1026963dce7ce |
| SHA256 | 593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d |
| SHA512 | ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80 |
C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE
| MD5 | 02ee6a3424782531461fb2f10713d3c1 |
| SHA1 | b581a2c365d93ebb629e8363fd9f69afc673123f |
| SHA256 | ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc |
| SHA512 | 6c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec |
C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe
| MD5 | 566ed4f62fdc96f175afedd811fa0370 |
| SHA1 | d4b47adc40e0d5a9391d3f6f2942d1889dd2a451 |
| SHA256 | e17cd94c08fc0e001a49f43a0801cea4625fb9aee211b6dfebebec446c21f460 |
| SHA512 | cdf8f508d396a1a0d2e0fc25f2ae46398b25039a0dafa0919737cc44e3e926ebae4c3aa26f1a3441511430f1a36241f8e61c515a5d9bd98ad4740d4d0f7b8db7 |
C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe
| MD5 | 58b58875a50a0d8b5e7be7d6ac685164 |
| SHA1 | 1e0b89c1b2585c76e758e9141b846ed4477b0662 |
| SHA256 | 2a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae |
| SHA512 | d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b |
C:\Windows\svchost.com
| MD5 | 223dd32576ace5da898257671c5cdf36 |
| SHA1 | 87474af22e6a24ef24de43d2e798c87bd986514c |
| SHA256 | 8d4dbd3013a493f904e0863bb55d910bbb640ef3bdc6fcbaf3c78e95fbdd5254 |
| SHA512 | aaef06b777e4b015af8843b2955af6fbc4c6c7a0630729737a76464d9a443cf673b5b583ae7cf2ea2333f81bd083cf104bb4da9add41a5da48bc4eb1bf0dbdc7 |
C:\Windows\directx.sys
| MD5 | 5ac1fd5515366b3ff2073ec90f52d9a2 |
| SHA1 | b5e7a378b2d0c9084d492031515f961cc1da3ed7 |
| SHA256 | 2a8028d5bc2b012f2339457aa33c11232fac465b5e78115eee2675c5a172b437 |
| SHA512 | df68050295166523a52ff35224e77bc74b1f9a5c5c3a462b19cade714c4b64c68b957570a0d679f550d415f8a5abd16f175ec4275a950e2d89186582a00f0244 |
memory/2712-67-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2672-66-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2644-53-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2684-52-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2116-39-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1780-38-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2916-95-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2172-94-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2488-81-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2936-80-0x0000000000400000-0x000000000041B000-memory.dmp
memory/276-109-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2732-108-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1960-114-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1928-113-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2152-127-0x0000000000400000-0x000000000041B000-memory.dmp
memory/632-128-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1384-142-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1904-141-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2816-152-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1236-151-0x0000000000400000-0x000000000041B000-memory.dmp
memory/484-160-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1232-159-0x0000000000400000-0x000000000041B000-memory.dmp
memory/572-167-0x0000000000400000-0x000000000041B000-memory.dmp
memory/448-173-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2344-175-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1324-181-0x0000000000400000-0x000000000041B000-memory.dmp
memory/952-192-0x0000000000400000-0x000000000041B000-memory.dmp
memory/324-191-0x0000000000400000-0x000000000041B000-memory.dmp
memory/996-208-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1144-207-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1328-221-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1708-220-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2884-237-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2944-236-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1692-252-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2392-251-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2684-263-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2736-262-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3024-276-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2272-275-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2936-289-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2728-288-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1680-310-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2592-308-0x0000000000400000-0x000000000041B000-memory.dmp
memory/876-328-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2508-327-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2188-338-0x0000000000400000-0x000000000041B000-memory.dmp
memory/696-344-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1728-347-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1608-346-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1244-363-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1292-361-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2532-370-0x0000000000400000-0x000000000041B000-memory.dmp
memory/320-369-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2268-381-0x0000000000400000-0x000000000041B000-memory.dmp
memory/788-380-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2232-389-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1124-388-0x0000000000400000-0x000000000041B000-memory.dmp
memory/448-396-0x0000000000400000-0x000000000041B000-memory.dmp
memory/836-402-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1568-405-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1512-404-0x0000000000400000-0x000000000041B000-memory.dmp
memory/952-413-0x0000000000400000-0x000000000041B000-memory.dmp
memory/760-412-0x0000000000400000-0x000000000041B000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-15 17:36
Reported
2024-06-15 17:39
Platform
win10v2004-20240611-en
Max time kernel
98s
Max time network
93s
Command Line
Signatures
Detect Neshta payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Neshta
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747dd5a520297697c280a00436847460_NeikiAnalytics.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
Executes dropped EXE
Modifies system executable filetype association
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Local\Temp\747dd5a520297697c280a00436847460_NeikiAnalytics.exe | N/A |
Reads user/profile data of web browsers
Drops file in Program Files directory
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747dd5a520297697c280a00436847460_NeikiAnalytics.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\747dd5a520297697c280a00436847460_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\747dd5a520297697c280a00436847460_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Local\Temp\3582-490\747dd5a520297697c280a00436847460_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\3582-490\747dd5a520297697c280a00436847460_NeikiAnalytics.exe"
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\System32\sihclient.exe
C:\Windows\System32\sihclient.exe /cv LK7Evy+JekO7tEJixTKR+A.0.1
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Windows\system32\backgroundTaskHost.exe
"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE"
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Users\Admin\AppData\Local\Temp\3582-490\747DD5~1.EXE
C:\Windows\System32\Conhost.exe
\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 13.107.21.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 237.21.107.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.32.126.40.in-addr.arpa | udp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 97.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 145.83.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 139.53.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\3582-490\747dd5a520297697c280a00436847460_NeikiAnalytics.exe
| MD5 | 1df5bef57c72b8d23f5263046e5dd043 |
| SHA1 | 68e859eca519f8f5cc1c9ceb3dfaaac87e17b544 |
| SHA256 | 43bb08a4762778843eca24c57d61f854a3c4a21f4da9f6bb15a34764a07596f3 |
| SHA512 | 4bee5ae57f39b842c481280ac98c75106ed41aa34b783c2967a705511268fe2a4a2a489386c9b5bd2d291454989b9d7f7d644ef36300ca9feada4f016c592332 |
C:\Windows\svchost.com
| MD5 | 223dd32576ace5da898257671c5cdf36 |
| SHA1 | 87474af22e6a24ef24de43d2e798c87bd986514c |
| SHA256 | 8d4dbd3013a493f904e0863bb55d910bbb640ef3bdc6fcbaf3c78e95fbdd5254 |
| SHA512 | aaef06b777e4b015af8843b2955af6fbc4c6c7a0630729737a76464d9a443cf673b5b583ae7cf2ea2333f81bd083cf104bb4da9add41a5da48bc4eb1bf0dbdc7 |
memory/2568-16-0x0000000000400000-0x000000000041B000-memory.dmp
C:\Windows\directx.sys
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Windows\directx.sys
| MD5 | 5ac1fd5515366b3ff2073ec90f52d9a2 |
| SHA1 | b5e7a378b2d0c9084d492031515f961cc1da3ed7 |
| SHA256 | 2a8028d5bc2b012f2339457aa33c11232fac465b5e78115eee2675c5a172b437 |
| SHA512 | df68050295166523a52ff35224e77bc74b1f9a5c5c3a462b19cade714c4b64c68b957570a0d679f550d415f8a5abd16f175ec4275a950e2d89186582a00f0244 |
memory/1028-20-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2960-28-0x0000000000400000-0x000000000041B000-memory.dmp
memory/5096-39-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4920-40-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3316-44-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3436-52-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2772-62-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3840-64-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1480-74-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4532-76-0x0000000000400000-0x000000000041B000-memory.dmp
memory/952-80-0x0000000000400000-0x000000000041B000-memory.dmp
C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe
| MD5 | 8ffc3bdf4a1903d9e28b99d1643fc9c7 |
| SHA1 | 919ba8594db0ae245a8abd80f9f3698826fc6fe5 |
| SHA256 | 8268d3fefe8ca96a25a73690d14bacf644170ab5e9e70d2f8eeb350a4c83f9f6 |
| SHA512 | 0b94ead97374d74eaee87e7614ddd3911d2cf66d4c49abbfd06b02c03e5dd56fd00993b4947e8a4bcd9d891fa39cab18cc6b61efc7d0812e91eb3aea9cd1a427 |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe
| MD5 | 576410de51e63c3b5442540c8fdacbee |
| SHA1 | 8de673b679e0fee6e460cbf4f21ab728e41e0973 |
| SHA256 | 3f00404dd591c2856e6f71bd78423ed47199902e0b85f228e6c4de72c59ddffe |
| SHA512 | f7761f3878775b30cc3d756fa122e74548dfc0a27e38fa4109e34a59a009df333d074bf14a227549ae347605f271be47984c55148685faac479aeb481f7191db |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe
| MD5 | cce8964848413b49f18a44da9cb0a79b |
| SHA1 | 0b7452100d400acebb1c1887542f322a92cbd7ae |
| SHA256 | fe44ca8d5050932851aa54c23133277e66db939501af58e5aeb7b67ec1dde7b5 |
| SHA512 | bf8fc270229d46a083ced30da6637f3ca510b0ce44624a9b21ec6aacac81666dffd41855053a936aa9e8ea6e745a09b820b506ec7bf1173b6f1837828a35103d |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE
| MD5 | 8c753d6448183dea5269445738486e01 |
| SHA1 | ebbbdc0022ca7487cd6294714cd3fbcb70923af9 |
| SHA256 | 473eb551101caeaf2d18f811342e21de323c8dd19ed21011997716871defe997 |
| SHA512 | 4f6fddefc42455540448eac0b693a4847e21b68467486376a4186776bfe137337733d3075b7b87ed7dac532478dc9afc63883607ec8205df3f155fee64c7a9be |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE
| MD5 | 92dc0a5b61c98ac6ca3c9e09711e0a5d |
| SHA1 | f809f50cfdfbc469561bced921d0bad343a0d7b4 |
| SHA256 | 3e9da97a7106122245e77f13f3f3cc96c055d732ab841eb848d03ac25401c1bc |
| SHA512 | d9eefb19f82e0786d9be0dbe5e339d25473fb3a09682f40c6d190d4c320cca5556abb72b5d97c6b0da4f8faefdc6d39ac9d0415fdf94ebcc90ecdf2e513c6a31 |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE
| MD5 | 176436d406fd1aabebae353963b3ebcf |
| SHA1 | 9ffdfdb8cc832a0c6501c4c0e85b23a0f7eff57a |
| SHA256 | 2f947e3ca624ce7373080b4a3934e21644fb070a53feeaae442b15b849c2954f |
| SHA512 | a2d1a714e0c1e5463260c64048ba8fd5064cfa06d4a43d02fc04a30748102ff5ba86d20a08e611e200dc778e2b7b3ae808da48132a05a61aa09ac424a182a06a |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE
| MD5 | 12c29dd57aa69f45ddd2e47620e0a8d9 |
| SHA1 | ba297aa3fe237ca916257bc46370b360a2db2223 |
| SHA256 | 22a585c183e27b3c732028ff193733c2f9d03700a0e95e65c556b0592c43d880 |
| SHA512 | 255176cd1a88dfa2af3838769cc20dc7ad9d969344801f07b9ebb372c12cee3f47f2dba3559f391deab10650875cad245d9724acfa23a42b336bfa96559a5488 |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE
| MD5 | 4ddc609ae13a777493f3eeda70a81d40 |
| SHA1 | 8957c390f9b2c136d37190e32bccae3ae671c80a |
| SHA256 | 16d65f2463658a72dba205dcaa18bc3d0bab4453e726233d68bc176e69db0950 |
| SHA512 | 9d7f90d1529cab20078c2690bf7bffab5a451a41d8993781effe807e619da0e7292f991da2f0c5c131b111d028b3e6084e5648c90816e74dfb664e7f78181bc5 |
memory/2240-122-0x0000000000400000-0x000000000041B000-memory.dmp
C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe
| MD5 | 5791075058b526842f4601c46abd59f5 |
| SHA1 | b2748f7542e2eebcd0353c3720d92bbffad8678f |
| SHA256 | 5c3ef3ec7594c040146e908014791dd15201ba58b4d70032770bb661b6a0e394 |
| SHA512 | 83e303971ed64019fde9e4ba6f6e889f8fb105088490dfa7dcf579a12baff20ef491f563d132d60c7b24a4fd3cac29bd9dc974571cd162000fae8fba4e0e54fb |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE
| MD5 | 3b73078a714bf61d1c19ebc3afc0e454 |
| SHA1 | 9abeabd74613a2f533e2244c9ee6f967188e4e7e |
| SHA256 | ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29 |
| SHA512 | 75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4 |
memory/4580-89-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4464-125-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4872-129-0x0000000000400000-0x000000000041B000-memory.dmp
memory/5088-137-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2392-141-0x0000000000400000-0x000000000041B000-memory.dmp
C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE
| MD5 | 40c8e5f4f7fb2fa4c6ed47e7f254a3cc |
| SHA1 | 5da20099194e003816c3fd46408b5e5ab934b424 |
| SHA256 | 2a28751ada21b17ca140ed3a03dccd29995b2ef702528eed1cc02bff0292f327 |
| SHA512 | 5e91bd9347df79eca484f6c5768930a191ffd679d5979b8c896f620c6f207c02f737782f0c6453e0973748c78bc9bc2cc537b27378f73a80dd254c2df9667ae3 |
C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe
| MD5 | e7a27a45efa530c657f58fda9f3b9f4a |
| SHA1 | 6c0d29a8b75574e904ab1c39fc76b39ca8f8e461 |
| SHA256 | d6f11401f57293922fb36cd7542ae811ab567a512449e566f83ce0dcef5ff8e5 |
| SHA512 | 0c37b41f3c075cd89a764d81f751c3a704a19240ad8e4ebab591f399b9b168b920575749e9d24c2a8f0400b9f340ab9fea4db76ff7060d8af00e2b36ac0c4a54 |
C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\java.exe
| MD5 | 0511abca39ed6d36fff86a8b6f2266cd |
| SHA1 | bfe55ac898d7a570ec535328b6283a1cdfa33b00 |
| SHA256 | 76ae68fc7c6c552c4a98c5df640cd96cf27b62e7e1536b7f7d08eff56fcde8b8 |
| SHA512 | 6608412e3ed0057f387bafcddcb07bfe7da4f207c7300c460e5acc4bd234cec3362191800789eb465eb120ec069e3ed49eabb6bd7db30d9e9245a89bb20e4346 |
C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaw.exe
| MD5 | 6f87ccb8ab73b21c9b8288b812de8efa |
| SHA1 | a709254f843a4cb50eec3bb0a4170ad3e74ea9b3 |
| SHA256 | 14e7a1f2f930380903ae3c912b4a70fd0a59916315c46874805020fe41215c22 |
| SHA512 | 619b45b9728880691a88fbfc396c9d34b41d5e349e04d2eb2d18c535fffc079395835af2af7ca69319954a98852d2f9b7891eff91864d63bf25759c156e192ee |
C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe
| MD5 | de69c005b0bbb513e946389227183eeb |
| SHA1 | 2a64efdcdc71654356f77a5b77da8b840dcc6674 |
| SHA256 | ad7b167ab599b6dad7e7f0ad47368643d91885253f95fadf0fadd1f8eb6ee9c7 |
| SHA512 | 6ca8cec0cf20ee9b8dfe263e48f211b6f1e19e3b4fc0f6e89807f39d3f4e862f0139eb5b35e3133ef60555589ad54406fb11d95845568a5538602f287863b7d7 |
C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE
| MD5 | 400836f307cf7dbfb469cefd3b0391e7 |
| SHA1 | 7af3cbb12d3b2d8b5d9553c687c6129d1dd90a10 |
| SHA256 | cb5c5abb625a812d47007c75e3855be3f29da527a41cf03730ad5c81f3eb629a |
| SHA512 | aa53cb304478585d6f83b19a6de4a7938ba2570d380a565a56ff5365aed073d5f56b95ad3228eb7d1e7e6110c6172a58b97bd6a5e57e4a8d39e762ed31dc17c8 |
C:\PROGRA~2\Google\Update\DISABL~1.EXE
| MD5 | 3b0e91f9bb6c1f38f7b058c91300e582 |
| SHA1 | 6e2e650941b1a96bb0bb19ff26a5d304bb09df5f |
| SHA256 | 57c993cadf4bf84810cea23a7112c6e260624beaab48d0e4332d3462900fec1d |
| SHA512 | a4fbe28a0135f4632e0a5b6bd775f8d010250b0fbfe223db1fe81d18552a6bc166ebce807853ba02e6a476e9829454805e415ca828a5e043bd1e63dc53599d0f |
C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE
| MD5 | f7c714dbf8e08ca2ed1a2bfb8ca97668 |
| SHA1 | cc78bf232157f98b68b8d81327f9f826dabb18ab |
| SHA256 | fc379fda348644fef660a3796861c122aa2dd5498e80279d1279a7ddb259e899 |
| SHA512 | 28bc04c4df3f632865e68e83d045b3ecd2a263e62853c922b260d0734026e8a1541988fcbf4ddc9cf3aba6863214d6c6eb51f8bbb2586122a7cb01a70f08d16c |
C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE
| MD5 | 7c73e01bd682dc67ef2fbb679be99866 |
| SHA1 | ad3834bd9f95f8bf64eb5be0a610427940407117 |
| SHA256 | da333c92fdfd2e8092f5b56686b94f713f8fa27ef8f333e7222259ad1eb08f5d |
| SHA512 | b2f3398e486cde482cb6bea18f4e5312fa2db7382ca25cea17bcba5ab1ff0e891d59328bc567641a9da05caca4d7c61dc102289d46e7135f947ce6155e295711 |
C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE
| MD5 | 41b1e87b538616c6020369134cbce857 |
| SHA1 | a255c7fef7ba2fc1a7c45d992270d5af023c5f67 |
| SHA256 | 08465cc139ee50a7497f8c842f74730d3a8f1a73c0b7caca95e9e6d37d3beed3 |
| SHA512 | 3a354d3577b45f6736203d5a35a2d1d543da2d1e268cefeffe6bdb723ff63c720ceb2838701144f5fec611470d77649846e0fb4770d6439f321f6b819f03e4db |
C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE
| MD5 | 5e08d87c074f0f8e3a8e8c76c5bf92ee |
| SHA1 | f52a554a5029fb4749842b2213d4196c95d48561 |
| SHA256 | 5d548c2cc25d542f2061ed9c8e38bd5ca72bddb37dd17654346cae8a19645714 |
| SHA512 | dd98d6fa7d943604914b2e3b27e1f21a95f1fe1feb942dd6956e864da658f4fbd9d1d0cf775e79ceaae6a025aafd4e633763389c37034134bd5245969bec383e |
C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE
| MD5 | a5d9eaa7d52bffc494a5f58203c6c1b5 |
| SHA1 | 97928ba7b61b46a1a77a38445679d040ffca7cc8 |
| SHA256 | 34b8662d38e7d3d6394fa6c965d943d2c82ea06ba9d7a0af4f8e0571fb5a9c48 |
| SHA512 | b6fdc8389bb4d736d608600469be6a4b0452aa3ea082f9a0791022a14c02b8fb7dcd62df133b0518e91283094eaba2be9318316f72d2c4aae6286d3e8686e787 |
C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe
| MD5 | 5119e350591269f44f732b470024bb7c |
| SHA1 | 4ccd48e4c6ba6e162d1520760ee3063e93e2c014 |
| SHA256 | 2b3aa9642b291932ba7f9f3d85221402a9d27078f56ef0e9c6bca633616e3873 |
| SHA512 | 599b4ec673169d42a348d1117737b4ad4d7539574153df5a5c7689130c9ac5ff5cd00f3c8ec39adf32ff2b56be074081efcabb6456272c649703c3ea6cdaded4 |
memory/3940-206-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3736-221-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2928-247-0x0000000000400000-0x000000000041B000-memory.dmp
memory/764-249-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4324-259-0x0000000000400000-0x000000000041B000-memory.dmp
memory/316-279-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2296-281-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3220-285-0x0000000000400000-0x000000000041B000-memory.dmp
memory/5076-293-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1964-300-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3300-305-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2696-307-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1532-313-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4048-320-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3552-321-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3892-328-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2824-329-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1036-336-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2444-337-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1800-344-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1408-345-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2084-347-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1064-353-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4192-355-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4872-361-0x0000000000400000-0x000000000041B000-memory.dmp
memory/5100-368-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4752-369-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3036-371-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3660-377-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4320-379-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3248-385-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2920-392-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4116-393-0x0000000000400000-0x000000000041B000-memory.dmp
memory/5104-400-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3736-401-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2340-408-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4536-409-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4496-411-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3728-417-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4848-419-0x0000000000400000-0x000000000041B000-memory.dmp
memory/372-425-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4504-427-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1464-433-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2532-435-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4592-441-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2956-448-0x0000000000400000-0x000000000041B000-memory.dmp