Analysis
-
max time kernel
173s -
max time network
171s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 01:18
Static task
static1
Behavioral task
behavioral1
Sample
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe
Resource
win10-en-20211208
General
-
Target
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe
-
Size
247KB
-
MD5
d19dd26e8431e2bf91a977e6cbda25ae
-
SHA1
5632744a3749814de3964a505091ab368ad1b20b
-
SHA256
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8
-
SHA512
1d9b09edb34c1c68024279ab3487b17cf67e2e395cd8a109ff3c1e2d23dadf96c163431019542e58755f294a2dae593b6fb3c7f1b88eca2007629e40dff8d358
Malware Config
Signatures
-
Detect Neshta Payload 35 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\odt\OFFICE~1.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE family_neshta C:\Windows\svchost.com family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Executes dropped EXE 64 IoCs
Processes:
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exesvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.compid process 4060 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe 4220 svchost.com 4256 AF47F8~1.EXE 4212 svchost.com 4368 AF47F8~1.EXE 4388 svchost.com 4316 AF47F8~1.EXE 3280 svchost.com 3880 AF47F8~1.EXE 3704 svchost.com 3352 AF47F8~1.EXE 672 svchost.com 764 AF47F8~1.EXE 1068 svchost.com 1232 AF47F8~1.EXE 1448 svchost.com 1624 AF47F8~1.EXE 1876 svchost.com 2056 AF47F8~1.EXE 2340 svchost.com 2564 AF47F8~1.EXE 2660 svchost.com 2692 AF47F8~1.EXE 3964 svchost.com 3164 AF47F8~1.EXE 4816 svchost.com 1312 AF47F8~1.EXE 1892 svchost.com 2956 AF47F8~1.EXE 4900 svchost.com 4544 AF47F8~1.EXE 3932 svchost.com 3152 AF47F8~1.EXE 4880 svchost.com 5048 AF47F8~1.EXE 2604 svchost.com 5040 AF47F8~1.EXE 1088 svchost.com 600 AF47F8~1.EXE 732 svchost.com 2436 AF47F8~1.EXE 4988 svchost.com 356 AF47F8~1.EXE 688 svchost.com 1252 AF47F8~1.EXE 4508 svchost.com 4500 AF47F8~1.EXE 1420 svchost.com 2296 AF47F8~1.EXE 2260 svchost.com 1860 AF47F8~1.EXE 1948 svchost.com 2024 AF47F8~1.EXE 4440 svchost.com 2236 AF47F8~1.EXE 4164 svchost.com 2904 AF47F8~1.EXE 3004 svchost.com 4000 AF47F8~1.EXE 3916 svchost.com 3788 AF47F8~1.EXE 3920 svchost.com 3776 AF47F8~1.EXE 3124 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exeaf47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exedescription ioc process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WINDOW~2\WinMail.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WINDOW~4\ACCESS~1\wordpad.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WINDOW~4\ACCESS~1\wordpad.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\armsvc.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.comAF47F8~1.EXEAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comsvchost.comAF47F8~1.EXEAF47F8~1.EXEsvchost.comAF47F8~1.EXEAF47F8~1.EXEsvchost.comAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEsvchost.comsvchost.comAF47F8~1.EXEsvchost.comsvchost.comAF47F8~1.EXEAF47F8~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comsvchost.comsvchost.comAF47F8~1.EXEAF47F8~1.EXEsvchost.comAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEsvchost.comsvchost.comsvchost.comAF47F8~1.EXEdescription ioc process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
Processes:
AF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings AF47F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exeaf47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exesvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEdescription pid process target process PID 496 wrote to memory of 4060 496 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe PID 496 wrote to memory of 4060 496 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe PID 496 wrote to memory of 4060 496 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe PID 4060 wrote to memory of 4220 4060 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe svchost.com PID 4060 wrote to memory of 4220 4060 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe svchost.com PID 4060 wrote to memory of 4220 4060 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe svchost.com PID 4220 wrote to memory of 4256 4220 svchost.com AF47F8~1.EXE PID 4220 wrote to memory of 4256 4220 svchost.com AF47F8~1.EXE PID 4220 wrote to memory of 4256 4220 svchost.com AF47F8~1.EXE PID 4256 wrote to memory of 4212 4256 AF47F8~1.EXE svchost.com PID 4256 wrote to memory of 4212 4256 AF47F8~1.EXE svchost.com PID 4256 wrote to memory of 4212 4256 AF47F8~1.EXE svchost.com PID 4212 wrote to memory of 4368 4212 svchost.com AF47F8~1.EXE PID 4212 wrote to memory of 4368 4212 svchost.com AF47F8~1.EXE PID 4212 wrote to memory of 4368 4212 svchost.com AF47F8~1.EXE PID 4368 wrote to memory of 4388 4368 AF47F8~1.EXE svchost.com PID 4368 wrote to memory of 4388 4368 AF47F8~1.EXE svchost.com PID 4368 wrote to memory of 4388 4368 AF47F8~1.EXE svchost.com PID 4388 wrote to memory of 4316 4388 svchost.com AF47F8~1.EXE PID 4388 wrote to memory of 4316 4388 svchost.com AF47F8~1.EXE PID 4388 wrote to memory of 4316 4388 svchost.com AF47F8~1.EXE PID 4316 wrote to memory of 3280 4316 AF47F8~1.EXE svchost.com PID 4316 wrote to memory of 3280 4316 AF47F8~1.EXE svchost.com PID 4316 wrote to memory of 3280 4316 AF47F8~1.EXE svchost.com PID 3280 wrote to memory of 3880 3280 svchost.com AF47F8~1.EXE PID 3280 wrote to memory of 3880 3280 svchost.com AF47F8~1.EXE PID 3280 wrote to memory of 3880 3280 svchost.com AF47F8~1.EXE PID 3880 wrote to memory of 3704 3880 AF47F8~1.EXE svchost.com PID 3880 wrote to memory of 3704 3880 AF47F8~1.EXE svchost.com PID 3880 wrote to memory of 3704 3880 AF47F8~1.EXE svchost.com PID 3704 wrote to memory of 3352 3704 svchost.com AF47F8~1.EXE PID 3704 wrote to memory of 3352 3704 svchost.com AF47F8~1.EXE PID 3704 wrote to memory of 3352 3704 svchost.com AF47F8~1.EXE PID 3352 wrote to memory of 672 3352 AF47F8~1.EXE svchost.com PID 3352 wrote to memory of 672 3352 AF47F8~1.EXE svchost.com PID 3352 wrote to memory of 672 3352 AF47F8~1.EXE svchost.com PID 672 wrote to memory of 764 672 svchost.com AF47F8~1.EXE PID 672 wrote to memory of 764 672 svchost.com AF47F8~1.EXE PID 672 wrote to memory of 764 672 svchost.com AF47F8~1.EXE PID 764 wrote to memory of 1068 764 AF47F8~1.EXE svchost.com PID 764 wrote to memory of 1068 764 AF47F8~1.EXE svchost.com PID 764 wrote to memory of 1068 764 AF47F8~1.EXE svchost.com PID 1068 wrote to memory of 1232 1068 svchost.com AF47F8~1.EXE PID 1068 wrote to memory of 1232 1068 svchost.com AF47F8~1.EXE PID 1068 wrote to memory of 1232 1068 svchost.com AF47F8~1.EXE PID 1232 wrote to memory of 1448 1232 AF47F8~1.EXE svchost.com PID 1232 wrote to memory of 1448 1232 AF47F8~1.EXE svchost.com PID 1232 wrote to memory of 1448 1232 AF47F8~1.EXE svchost.com PID 1448 wrote to memory of 1624 1448 svchost.com AF47F8~1.EXE PID 1448 wrote to memory of 1624 1448 svchost.com AF47F8~1.EXE PID 1448 wrote to memory of 1624 1448 svchost.com AF47F8~1.EXE PID 1624 wrote to memory of 1876 1624 AF47F8~1.EXE svchost.com PID 1624 wrote to memory of 1876 1624 AF47F8~1.EXE svchost.com PID 1624 wrote to memory of 1876 1624 AF47F8~1.EXE svchost.com PID 1876 wrote to memory of 2056 1876 svchost.com AF47F8~1.EXE PID 1876 wrote to memory of 2056 1876 svchost.com AF47F8~1.EXE PID 1876 wrote to memory of 2056 1876 svchost.com AF47F8~1.EXE PID 2056 wrote to memory of 2340 2056 AF47F8~1.EXE svchost.com PID 2056 wrote to memory of 2340 2056 AF47F8~1.EXE svchost.com PID 2056 wrote to memory of 2340 2056 AF47F8~1.EXE svchost.com PID 2340 wrote to memory of 2564 2340 svchost.com AF47F8~1.EXE PID 2340 wrote to memory of 2564 2340 svchost.com AF47F8~1.EXE PID 2340 wrote to memory of 2564 2340 svchost.com AF47F8~1.EXE PID 2564 wrote to memory of 2660 2564 AF47F8~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe"C:\Users\Admin\AppData\Local\Temp\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"23⤵
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE24⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"25⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3964
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE1⤵
- Executes dropped EXE
PID:3164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"2⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE3⤵
- Executes dropped EXE
PID:1312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"4⤵
- Executes dropped EXE
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE5⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"6⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE7⤵
- Executes dropped EXE
PID:4544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"8⤵
- Executes dropped EXE
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE9⤵
- Executes dropped EXE
PID:3152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"10⤵
- Executes dropped EXE
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE11⤵
- Executes dropped EXE
PID:5048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"12⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE13⤵
- Executes dropped EXE
PID:5040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"14⤵
- Executes dropped EXE
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE15⤵
- Executes dropped EXE
PID:600 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"16⤵
- Executes dropped EXE
PID:732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE17⤵
- Executes dropped EXE
PID:2436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"18⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE19⤵
- Executes dropped EXE
PID:356 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"20⤵
- Executes dropped EXE
PID:688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE21⤵
- Executes dropped EXE
PID:1252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"22⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE23⤵
- Executes dropped EXE
PID:4500 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"24⤵
- Executes dropped EXE
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE25⤵
- Executes dropped EXE
PID:2296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"26⤵
- Executes dropped EXE
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE27⤵
- Executes dropped EXE
PID:1860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"28⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE29⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"30⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE31⤵
- Executes dropped EXE
- Modifies registry class
PID:2236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"32⤵
- Executes dropped EXE
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE33⤵
- Executes dropped EXE
PID:2904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"34⤵
- Executes dropped EXE
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE35⤵
- Executes dropped EXE
PID:4000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"36⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE37⤵
- Executes dropped EXE
PID:3788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"38⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE39⤵
- Executes dropped EXE
PID:3776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"40⤵
- Executes dropped EXE
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE41⤵PID:4996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"42⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE43⤵PID:344
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"44⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE45⤵PID:4228
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"46⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE47⤵PID:4336
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"48⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE49⤵PID:4396
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"50⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE51⤵PID:3264
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"52⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE53⤵PID:3188
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"54⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE55⤵PID:584
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"56⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE57⤵PID:3704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"58⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE59⤵PID:916
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"60⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE61⤵PID:1268
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"62⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE63⤵PID:412
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"64⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE65⤵PID:1500
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"66⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE67⤵PID:3288
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"68⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE69⤵PID:2676
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"70⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE71⤵PID:3744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"72⤵PID:3740
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE1⤵PID:3968
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"2⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE3⤵PID:4536
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"4⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE5⤵PID:4816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"6⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE7⤵PID:1984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"8⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE9⤵PID:1528
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"10⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE11⤵PID:4544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"12⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE13⤵PID:3120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"14⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE15⤵PID:2880
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"16⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE17⤵
- Modifies registry class
PID:392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"18⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE19⤵
- Drops file in Windows directory
PID:2616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"20⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE21⤵PID:4904
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"22⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE23⤵PID:1996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"24⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE25⤵
- Modifies registry class
PID:1240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"26⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE27⤵PID:4504
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"28⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE29⤵PID:1636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"30⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE31⤵
- Modifies registry class
PID:1712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"32⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE33⤵PID:1940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"34⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE35⤵PID:2320
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"36⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE37⤵PID:2960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"38⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE39⤵PID:4736
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"40⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE41⤵PID:3892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"42⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE43⤵PID:3292
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"44⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE45⤵PID:4996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"46⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE47⤵PID:4360
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"48⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE49⤵
- Modifies registry class
PID:4340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"50⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE51⤵PID:4312
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"52⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE53⤵PID:4388
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"54⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE55⤵PID:3260
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"56⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE57⤵
- Modifies registry class
PID:580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"58⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE59⤵PID:428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"60⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE61⤵PID:1428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"62⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE63⤵PID:1512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"64⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE65⤵PID:1068
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"66⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE67⤵
- Modifies registry class
PID:1888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"68⤵
- Drops file in Windows directory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE69⤵PID:2608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"70⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE71⤵PID:2596
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"72⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE73⤵PID:2052
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"74⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE75⤵
- Modifies registry class
PID:3740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"76⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE77⤵PID:3964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"78⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE79⤵PID:1168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"80⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE81⤵PID:2308
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"82⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE83⤵PID:4840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"84⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE85⤵
- Modifies registry class
PID:3128 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"86⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE87⤵PID:5032
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"88⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE89⤵PID:2896
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"90⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE91⤵PID:2600
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"92⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE93⤵PID:732
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"94⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE95⤵PID:2376
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"96⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE97⤵PID:364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"98⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE99⤵PID:1252
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"100⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE101⤵PID:3012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"102⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE103⤵PID:1708
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"104⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE105⤵PID:2260
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"106⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE107⤵PID:1948
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"108⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE109⤵PID:2236
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"110⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE111⤵PID:5012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"112⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE113⤵PID:3296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"114⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE115⤵PID:4376
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"116⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE117⤵PID:4984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"118⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE119⤵PID:3940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"120⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE121⤵PID:4224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"122⤵PID:4260
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-