Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2022 19:27
Static task
static1
Behavioral task
behavioral1
Sample
3c486c0379adb13b1681348c6d6320c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c486c0379adb13b1681348c6d6320c5.exe
Resource
win10v2004-20220812-en
General
-
Target
3c486c0379adb13b1681348c6d6320c5.exe
-
Size
583KB
-
MD5
3c486c0379adb13b1681348c6d6320c5
-
SHA1
04d7990377aa80f4ae8eff03755ce355fabdbc38
-
SHA256
b337ab8ee2fddfd12f279affb5f88c35bdc195d62c2d6bd4343b567a22f5d04f
-
SHA512
57d78f4753dc087b7b03f032840751b36baab2337c27b60090c927be28b2f805f74f635491dc4fd25dd47746f00610ace50d77bb635bcd163370ab8d290b5050
-
SSDEEP
12288:jadDbBU0mhLjrl7RvL8GIapZLv4foexa+ega+ega+en:ja1WzvoraPaa+3a+3a+c
Malware Config
Signatures
-
Detect Neshta payload 33 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\odt\OFFICE~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe family_neshta C:\Windows\svchost.com family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
3c486c0379adb13b1681348c6d6320c5.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 3c486c0379adb13b1681348c6d6320c5.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
svchost.exe3c486c0379adb13b1681348c6d6320c5.exesvchost.exe3c486c0379adb13b1681348c6d6320c5.exesvchost.exe3c486c0379adb13b1681348c6d6320c5.exesvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEpid process 740 svchost.exe 1648 3c486c0379adb13b1681348c6d6320c5.exe 2032 svchost.exe 320 3c486c0379adb13b1681348c6d6320c5.exe 204 svchost.exe 308 3c486c0379adb13b1681348c6d6320c5.exe 1692 svchost.com 5060 3C486C~1.EXE 4984 svchost.com 4476 3C486C~1.EXE 4780 svchost.com 2376 3C486C~1.EXE 2272 svchost.com 1268 3C486C~1.EXE 4172 svchost.com 448 3C486C~1.EXE 3060 svchost.com 2188 3C486C~1.EXE 1564 svchost.com 3048 3C486C~1.EXE 2900 svchost.com 4840 3C486C~1.EXE 2088 svchost.com 2172 3C486C~1.EXE 4560 svchost.com 5108 3C486C~1.EXE 4872 svchost.com 4500 3C486C~1.EXE 4536 svchost.com 1272 3C486C~1.EXE 3904 svchost.com 4380 3C486C~1.EXE 2744 svchost.com 4888 3C486C~1.EXE 4852 svchost.com 2400 3C486C~1.EXE 408 svchost.com 4676 3C486C~1.EXE 1756 svchost.com 3016 3C486C~1.EXE 3660 svchost.com 1472 3C486C~1.EXE 1788 svchost.com 4620 3C486C~1.EXE 1096 svchost.com 1856 3C486C~1.EXE 2068 svchost.com 4052 3C486C~1.EXE 3752 svchost.com 1692 3C486C~1.EXE 5060 svchost.com 3892 3C486C~1.EXE 4224 svchost.com 3180 3C486C~1.EXE 2252 svchost.com 616 3C486C~1.EXE 3796 svchost.com 3952 3C486C~1.EXE 948 svchost.com 1392 3C486C~1.EXE 1484 svchost.com 1736 3C486C~1.EXE 4772 svchost.com 4508 3C486C~1.EXE -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3c486c0379adb13b1681348c6d6320c5.exe3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXEdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3c486c0379adb13b1681348c6d6320c5.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3C486C~1.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
3c486c0379adb13b1681348c6d6320c5.exe3c486c0379adb13b1681348c6d6320c5.exesvchost.exedescription ioc process File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\104012~1.47\BHO\IE_TO_~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\104012~1.47\MSEDGE~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MI9C33~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~4.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~3.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13165~1.21\MICROS~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\104012~1.47\IDENTI~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\104012~1.47\MSEDGE~2.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~2.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmap.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\104012~1.47\ELEVAT~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\104012~1.47\MSEDGE~3.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jps.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 3c486c0379adb13b1681348c6d6320c5.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 3c486c0379adb13b1681348c6d6320c5.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.comsvchost.comsvchost.comsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXE3C486C~1.EXE3C486C~1.EXEsvchost.comsvchost.com3C486C~1.EXEsvchost.comsvchost.com3C486C~1.EXE3C486C~1.EXEsvchost.com3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com3C486C~1.EXEsvchost.comsvchost.com3C486C~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com3C486C~1.EXE3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXE3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.comdescription ioc process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3C486C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3C486C~1.EXE File opened for modification C:\Windows\directx.sys 3C486C~1.EXE File opened for modification C:\Windows\svchost.com 3C486C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3C486C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3C486C~1.EXE File opened for modification C:\Windows\directx.sys 3C486C~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3C486C~1.EXE File opened for modification C:\Windows\directx.sys 3C486C~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys 3C486C~1.EXE File opened for modification C:\Windows\directx.sys 3C486C~1.EXE File opened for modification C:\Windows\directx.sys 3C486C~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3C486C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys 3C486C~1.EXE File opened for modification C:\Windows\directx.sys 3C486C~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com 3C486C~1.EXE File opened for modification C:\Windows\svchost.com 3C486C~1.EXE File opened for modification C:\Windows\svchost.com 3C486C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3C486C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3C486C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3C486C~1.EXE File opened for modification C:\Windows\svchost.com 3C486C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3C486C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com 3C486C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3C486C~1.EXE File opened for modification C:\Windows\svchost.com 3C486C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3C486C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
Processes:
3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXE3C486C~1.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 3C486C~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3c486c0379adb13b1681348c6d6320c5.exesvchost.exe3c486c0379adb13b1681348c6d6320c5.exe3c486c0379adb13b1681348c6d6320c5.exesvchost.exe3c486c0379adb13b1681348c6d6320c5.exesvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEsvchost.com3C486C~1.EXEdescription pid process target process PID 460 wrote to memory of 740 460 3c486c0379adb13b1681348c6d6320c5.exe svchost.exe PID 460 wrote to memory of 740 460 3c486c0379adb13b1681348c6d6320c5.exe svchost.exe PID 460 wrote to memory of 740 460 3c486c0379adb13b1681348c6d6320c5.exe svchost.exe PID 740 wrote to memory of 1648 740 svchost.exe 3c486c0379adb13b1681348c6d6320c5.exe PID 740 wrote to memory of 1648 740 svchost.exe 3c486c0379adb13b1681348c6d6320c5.exe PID 740 wrote to memory of 1648 740 svchost.exe 3c486c0379adb13b1681348c6d6320c5.exe PID 1648 wrote to memory of 320 1648 3c486c0379adb13b1681348c6d6320c5.exe 3c486c0379adb13b1681348c6d6320c5.exe PID 1648 wrote to memory of 320 1648 3c486c0379adb13b1681348c6d6320c5.exe 3c486c0379adb13b1681348c6d6320c5.exe PID 1648 wrote to memory of 320 1648 3c486c0379adb13b1681348c6d6320c5.exe 3c486c0379adb13b1681348c6d6320c5.exe PID 320 wrote to memory of 204 320 3c486c0379adb13b1681348c6d6320c5.exe svchost.exe PID 320 wrote to memory of 204 320 3c486c0379adb13b1681348c6d6320c5.exe svchost.exe PID 320 wrote to memory of 204 320 3c486c0379adb13b1681348c6d6320c5.exe svchost.exe PID 204 wrote to memory of 308 204 svchost.exe 3c486c0379adb13b1681348c6d6320c5.exe PID 204 wrote to memory of 308 204 svchost.exe 3c486c0379adb13b1681348c6d6320c5.exe PID 204 wrote to memory of 308 204 svchost.exe 3c486c0379adb13b1681348c6d6320c5.exe PID 308 wrote to memory of 1692 308 3c486c0379adb13b1681348c6d6320c5.exe svchost.com PID 308 wrote to memory of 1692 308 3c486c0379adb13b1681348c6d6320c5.exe svchost.com PID 308 wrote to memory of 1692 308 3c486c0379adb13b1681348c6d6320c5.exe svchost.com PID 1692 wrote to memory of 5060 1692 svchost.com 3C486C~1.EXE PID 1692 wrote to memory of 5060 1692 svchost.com 3C486C~1.EXE PID 1692 wrote to memory of 5060 1692 svchost.com 3C486C~1.EXE PID 5060 wrote to memory of 4984 5060 3C486C~1.EXE svchost.com PID 5060 wrote to memory of 4984 5060 3C486C~1.EXE svchost.com PID 5060 wrote to memory of 4984 5060 3C486C~1.EXE svchost.com PID 4984 wrote to memory of 4476 4984 svchost.com 3C486C~1.EXE PID 4984 wrote to memory of 4476 4984 svchost.com 3C486C~1.EXE PID 4984 wrote to memory of 4476 4984 svchost.com 3C486C~1.EXE PID 4476 wrote to memory of 4780 4476 3C486C~1.EXE svchost.com PID 4476 wrote to memory of 4780 4476 3C486C~1.EXE svchost.com PID 4476 wrote to memory of 4780 4476 3C486C~1.EXE svchost.com PID 4780 wrote to memory of 2376 4780 svchost.com 3C486C~1.EXE PID 4780 wrote to memory of 2376 4780 svchost.com 3C486C~1.EXE PID 4780 wrote to memory of 2376 4780 svchost.com 3C486C~1.EXE PID 2376 wrote to memory of 2272 2376 3C486C~1.EXE svchost.com PID 2376 wrote to memory of 2272 2376 3C486C~1.EXE svchost.com PID 2376 wrote to memory of 2272 2376 3C486C~1.EXE svchost.com PID 2272 wrote to memory of 1268 2272 svchost.com 3C486C~1.EXE PID 2272 wrote to memory of 1268 2272 svchost.com 3C486C~1.EXE PID 2272 wrote to memory of 1268 2272 svchost.com 3C486C~1.EXE PID 1268 wrote to memory of 4172 1268 3C486C~1.EXE svchost.com PID 1268 wrote to memory of 4172 1268 3C486C~1.EXE svchost.com PID 1268 wrote to memory of 4172 1268 3C486C~1.EXE svchost.com PID 4172 wrote to memory of 448 4172 svchost.com 3C486C~1.EXE PID 4172 wrote to memory of 448 4172 svchost.com 3C486C~1.EXE PID 4172 wrote to memory of 448 4172 svchost.com 3C486C~1.EXE PID 448 wrote to memory of 3060 448 3C486C~1.EXE svchost.com PID 448 wrote to memory of 3060 448 3C486C~1.EXE svchost.com PID 448 wrote to memory of 3060 448 3C486C~1.EXE svchost.com PID 3060 wrote to memory of 2188 3060 svchost.com 3C486C~1.EXE PID 3060 wrote to memory of 2188 3060 svchost.com 3C486C~1.EXE PID 3060 wrote to memory of 2188 3060 svchost.com 3C486C~1.EXE PID 2188 wrote to memory of 1564 2188 3C486C~1.EXE svchost.com PID 2188 wrote to memory of 1564 2188 3C486C~1.EXE svchost.com PID 2188 wrote to memory of 1564 2188 3C486C~1.EXE svchost.com PID 1564 wrote to memory of 3048 1564 svchost.com 3C486C~1.EXE PID 1564 wrote to memory of 3048 1564 svchost.com 3C486C~1.EXE PID 1564 wrote to memory of 3048 1564 svchost.com 3C486C~1.EXE PID 3048 wrote to memory of 2900 3048 3C486C~1.EXE svchost.com PID 3048 wrote to memory of 2900 3048 3C486C~1.EXE svchost.com PID 3048 wrote to memory of 2900 3048 3C486C~1.EXE svchost.com PID 2900 wrote to memory of 4840 2900 svchost.com 3C486C~1.EXE PID 2900 wrote to memory of 4840 2900 svchost.com 3C486C~1.EXE PID 2900 wrote to memory of 4840 2900 svchost.com 3C486C~1.EXE PID 4840 wrote to memory of 2088 4840 3C486C~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c486c0379adb13b1681348c6d6320c5.exe"C:\Users\Admin\AppData\Local\Temp\3c486c0379adb13b1681348c6d6320c5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3c486c0379adb13b1681348c6d6320c5.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\3c486c0379adb13b1681348c6d6320c5.exe"C:\Users\Admin\AppData\Local\Temp\3c486c0379adb13b1681348c6d6320c5.exe"3⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\3c486c0379adb13b1681348c6d6320c5.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE14⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"23⤵
- Executes dropped EXE
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
PID:2172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"25⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE26⤵
- Executes dropped EXE
PID:5108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"27⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE28⤵
- Executes dropped EXE
PID:4500 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"29⤵
- Executes dropped EXE
PID:4536
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2032
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE1⤵
- Executes dropped EXE
PID:1272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"2⤵
- Executes dropped EXE
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"4⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE5⤵
- Executes dropped EXE
PID:4888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"6⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"8⤵
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE9⤵
- Executes dropped EXE
PID:4676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"10⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE11⤵
- Executes dropped EXE
PID:3016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"12⤵
- Executes dropped EXE
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE13⤵
- Executes dropped EXE
- Modifies registry class
PID:1472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"14⤵
- Executes dropped EXE
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE15⤵
- Executes dropped EXE
PID:4620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"16⤵
- Executes dropped EXE
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE17⤵
- Executes dropped EXE
PID:1856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"18⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE19⤵
- Executes dropped EXE
PID:4052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"20⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE21⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"22⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE23⤵
- Executes dropped EXE
PID:3892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"24⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE25⤵
- Executes dropped EXE
PID:3180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"26⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE27⤵
- Executes dropped EXE
PID:616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"28⤵
- Executes dropped EXE
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE29⤵
- Executes dropped EXE
PID:3952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"30⤵
- Executes dropped EXE
PID:948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE31⤵
- Executes dropped EXE
PID:1392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"32⤵
- Executes dropped EXE
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE33⤵
- Executes dropped EXE
- Checks computer location settings
PID:1736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"34⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE35⤵
- Executes dropped EXE
- Checks computer location settings
PID:4508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"36⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE37⤵PID:4160
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"38⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE39⤵PID:5112
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"40⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE41⤵PID:4456
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"42⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE43⤵PID:4340
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"44⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE45⤵PID:4896
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"46⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE47⤵PID:4352
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"48⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE49⤵PID:4168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"50⤵
- Drops file in Windows directory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE51⤵PID:1328
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"52⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE53⤵
- Modifies registry class
PID:5004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"54⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE55⤵PID:4312
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"56⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE57⤵PID:8
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"58⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE59⤵PID:3912
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"60⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE61⤵PID:5024
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"62⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE63⤵PID:2068
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"64⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE65⤵PID:4864
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"66⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE67⤵
- Modifies registry class
PID:2636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"68⤵
- Drops file in Windows directory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE69⤵PID:2036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"70⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE71⤵PID:3344
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"72⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE73⤵PID:4848
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"74⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE75⤵PID:3672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"76⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE77⤵PID:3224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"78⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE79⤵PID:828
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"80⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE81⤵
- Drops file in Windows directory
PID:2088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"82⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE83⤵PID:4572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"84⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE85⤵PID:1412
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"86⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE87⤵
- Checks computer location settings
PID:1224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"88⤵
- Drops file in Windows directory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE89⤵PID:3308
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"90⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE91⤵PID:4168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"92⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE93⤵PID:3500
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"94⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE95⤵
- Modifies registry class
PID:3656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"96⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE97⤵PID:624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"98⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE99⤵
- Checks computer location settings
- Drops file in Windows directory
PID:1076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"100⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE101⤵PID:1096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"102⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE103⤵PID:4528
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"104⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE105⤵PID:3748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"106⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE107⤵
- Checks computer location settings
PID:4740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"108⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE109⤵PID:4812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"110⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE111⤵
- Modifies registry class
PID:5088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"112⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE113⤵PID:2252
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"114⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE115⤵PID:3796
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"116⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE117⤵PID:1392
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"118⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE119⤵PID:1736
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"120⤵
- Drops file in Windows directory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE121⤵PID:4672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C486C~1.EXE"122⤵PID:1464
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-