Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 20:17
Static task
static1
Behavioral task
behavioral1
Sample
9672f07998972e5b99344a9e68b8024fa3ac9715195ecf90c74d9dceda72d9a6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9672f07998972e5b99344a9e68b8024fa3ac9715195ecf90c74d9dceda72d9a6.exe
Resource
win10v2004-20220812-en
General
-
Target
9672f07998972e5b99344a9e68b8024fa3ac9715195ecf90c74d9dceda72d9a6.exe
-
Size
21KB
-
MD5
42813bf853e513b71ba3c057c2fa1e50
-
SHA1
3df272a1dae28ed1324d36fa09aa0197b2b757b3
-
SHA256
9672f07998972e5b99344a9e68b8024fa3ac9715195ecf90c74d9dceda72d9a6
-
SHA512
2fc66ba2ec32afd17e2e82a9d97057078bac45bd7c9f4fae6d3915147e3c22e0982a5fab26db8c64106e42818e4b2210f4b5cc58cf9e8c6f6679dbd22dd6ac8c
-
SSDEEP
384:36SQ9KaonyYFtYqS7j1c1Nbj+AdSIFRCjn+nAOPxMd1YWVpd72KlJb0aJ:eKzyEtanK1F7d1Qn+nAOcPd71lJbt
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1704 SVCH0ST.EXE 1744 SVCH0ST.EXE 952 SVCH0ST.EXE 1320 SVCH0ST.EXE 1016 SVCH0ST.EXE 1372 SVCH0ST.EXE 2028 SVCH0ST.EXE 1888 SVCH0ST.EXE 676 SVCH0ST.EXE 1576 SVCH0ST.EXE 572 SVCH0ST.EXE 1956 SVCH0ST.EXE 1360 SVCH0ST.EXE 1020 SVCH0ST.EXE 1704 SVCH0ST.EXE 2032 SVCH0ST.EXE 1628 SVCH0ST.EXE 1772 SVCH0ST.EXE 756 SVCH0ST.EXE 1952 SVCH0ST.EXE 1144 SVCH0ST.EXE 1308 SVCH0ST.EXE 1760 SVCH0ST.EXE 664 SVCH0ST.EXE 1792 SVCH0ST.EXE 1828 SVCH0ST.EXE 1784 SVCH0ST.EXE 736 SVCH0ST.EXE 1632 SVCH0ST.EXE 1384 SVCH0ST.EXE 1364 SVCH0ST.EXE 1956 SVCH0ST.EXE 884 SVCH0ST.EXE 1736 SVCH0ST.EXE 944 SVCH0ST.EXE 1804 SVCH0ST.EXE 1712 SVCH0ST.EXE 812 SVCH0ST.EXE 892 SVCH0ST.EXE 928 SVCH0ST.EXE 1944 SVCH0ST.EXE 432 SVCH0ST.EXE 1400 SVCH0ST.EXE 1896 SVCH0ST.EXE 776 SVCH0ST.EXE 1664 SVCH0ST.EXE 1720 SVCH0ST.EXE 1492 SVCH0ST.EXE 588 SVCH0ST.EXE 1560 SVCH0ST.EXE 620 SVCH0ST.EXE 1364 SVCH0ST.EXE 1912 SVCH0ST.EXE 1700 SVCH0ST.EXE 1332 SVCH0ST.EXE 1704 SVCH0ST.EXE 1620 SVCH0ST.EXE 680 SVCH0ST.EXE 1188 SVCH0ST.EXE 1796 SVCH0ST.EXE 564 SVCH0ST.EXE 1532 SVCH0ST.EXE 816 SVCH0ST.EXE 1308 SVCH0ST.EXE -
Loads dropped DLL 64 IoCs
pid Process 1904 9672f07998972e5b99344a9e68b8024fa3ac9715195ecf90c74d9dceda72d9a6.exe 1904 9672f07998972e5b99344a9e68b8024fa3ac9715195ecf90c74d9dceda72d9a6.exe 1704 SVCH0ST.EXE 1704 SVCH0ST.EXE 1744 SVCH0ST.EXE 1744 SVCH0ST.EXE 952 SVCH0ST.EXE 952 SVCH0ST.EXE 1320 SVCH0ST.EXE 1320 SVCH0ST.EXE 1016 SVCH0ST.EXE 1016 SVCH0ST.EXE 1372 SVCH0ST.EXE 1372 SVCH0ST.EXE 2028 SVCH0ST.EXE 2028 SVCH0ST.EXE 1888 SVCH0ST.EXE 1888 SVCH0ST.EXE 676 SVCH0ST.EXE 676 SVCH0ST.EXE 1576 SVCH0ST.EXE 1576 SVCH0ST.EXE 572 SVCH0ST.EXE 572 SVCH0ST.EXE 1956 SVCH0ST.EXE 1956 SVCH0ST.EXE 1360 SVCH0ST.EXE 1360 SVCH0ST.EXE 1020 SVCH0ST.EXE 1020 SVCH0ST.EXE 1704 SVCH0ST.EXE 1704 SVCH0ST.EXE 2032 SVCH0ST.EXE 2032 SVCH0ST.EXE 1628 SVCH0ST.EXE 1628 SVCH0ST.EXE 1772 SVCH0ST.EXE 1772 SVCH0ST.EXE 756 SVCH0ST.EXE 756 SVCH0ST.EXE 1952 SVCH0ST.EXE 1952 SVCH0ST.EXE 1144 SVCH0ST.EXE 1144 SVCH0ST.EXE 1308 SVCH0ST.EXE 1308 SVCH0ST.EXE 1760 SVCH0ST.EXE 1760 SVCH0ST.EXE 664 SVCH0ST.EXE 664 SVCH0ST.EXE 1792 SVCH0ST.EXE 1792 SVCH0ST.EXE 1828 SVCH0ST.EXE 1828 SVCH0ST.EXE 1784 SVCH0ST.EXE 1784 SVCH0ST.EXE 736 SVCH0ST.EXE 736 SVCH0ST.EXE 1632 SVCH0ST.EXE 1632 SVCH0ST.EXE 1384 SVCH0ST.EXE 1384 SVCH0ST.EXE 1364 SVCH0ST.EXE 1364 SVCH0ST.EXE -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\WINDOWS\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\mmdat.dat SVCH0ST.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1904 9672f07998972e5b99344a9e68b8024fa3ac9715195ecf90c74d9dceda72d9a6.exe 1704 SVCH0ST.EXE 1744 SVCH0ST.EXE 952 SVCH0ST.EXE 1320 SVCH0ST.EXE 1016 SVCH0ST.EXE 1372 SVCH0ST.EXE 2028 SVCH0ST.EXE 1888 SVCH0ST.EXE 676 SVCH0ST.EXE 1576 SVCH0ST.EXE 572 SVCH0ST.EXE 1956 SVCH0ST.EXE 1360 SVCH0ST.EXE 1020 SVCH0ST.EXE 1704 SVCH0ST.EXE 2032 SVCH0ST.EXE 1628 SVCH0ST.EXE 1772 SVCH0ST.EXE 756 SVCH0ST.EXE 1952 SVCH0ST.EXE 1144 SVCH0ST.EXE 1308 SVCH0ST.EXE 1760 SVCH0ST.EXE 664 SVCH0ST.EXE 1792 SVCH0ST.EXE 1828 SVCH0ST.EXE 1784 SVCH0ST.EXE 736 SVCH0ST.EXE 1632 SVCH0ST.EXE 1384 SVCH0ST.EXE 1364 SVCH0ST.EXE 1956 SVCH0ST.EXE 884 SVCH0ST.EXE 1736 SVCH0ST.EXE 944 SVCH0ST.EXE 1804 SVCH0ST.EXE 1712 SVCH0ST.EXE 812 SVCH0ST.EXE 892 SVCH0ST.EXE 928 SVCH0ST.EXE 1944 SVCH0ST.EXE 432 SVCH0ST.EXE 1400 SVCH0ST.EXE 1896 SVCH0ST.EXE 776 SVCH0ST.EXE 1664 SVCH0ST.EXE 1720 SVCH0ST.EXE 1492 SVCH0ST.EXE 588 SVCH0ST.EXE 1560 SVCH0ST.EXE 620 SVCH0ST.EXE 1364 SVCH0ST.EXE 1912 SVCH0ST.EXE 1700 SVCH0ST.EXE 1332 SVCH0ST.EXE 1704 SVCH0ST.EXE 1620 SVCH0ST.EXE 680 SVCH0ST.EXE 1188 SVCH0ST.EXE 1796 SVCH0ST.EXE 564 SVCH0ST.EXE 1532 SVCH0ST.EXE 816 SVCH0ST.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1704 1904 9672f07998972e5b99344a9e68b8024fa3ac9715195ecf90c74d9dceda72d9a6.exe 27 PID 1904 wrote to memory of 1704 1904 9672f07998972e5b99344a9e68b8024fa3ac9715195ecf90c74d9dceda72d9a6.exe 27 PID 1904 wrote to memory of 1704 1904 9672f07998972e5b99344a9e68b8024fa3ac9715195ecf90c74d9dceda72d9a6.exe 27 PID 1904 wrote to memory of 1704 1904 9672f07998972e5b99344a9e68b8024fa3ac9715195ecf90c74d9dceda72d9a6.exe 27 PID 1704 wrote to memory of 1744 1704 SVCH0ST.EXE 28 PID 1704 wrote to memory of 1744 1704 SVCH0ST.EXE 28 PID 1704 wrote to memory of 1744 1704 SVCH0ST.EXE 28 PID 1704 wrote to memory of 1744 1704 SVCH0ST.EXE 28 PID 1744 wrote to memory of 952 1744 SVCH0ST.EXE 29 PID 1744 wrote to memory of 952 1744 SVCH0ST.EXE 29 PID 1744 wrote to memory of 952 1744 SVCH0ST.EXE 29 PID 1744 wrote to memory of 952 1744 SVCH0ST.EXE 29 PID 952 wrote to memory of 1320 952 SVCH0ST.EXE 30 PID 952 wrote to memory of 1320 952 SVCH0ST.EXE 30 PID 952 wrote to memory of 1320 952 SVCH0ST.EXE 30 PID 952 wrote to memory of 1320 952 SVCH0ST.EXE 30 PID 1320 wrote to memory of 1016 1320 SVCH0ST.EXE 31 PID 1320 wrote to memory of 1016 1320 SVCH0ST.EXE 31 PID 1320 wrote to memory of 1016 1320 SVCH0ST.EXE 31 PID 1320 wrote to memory of 1016 1320 SVCH0ST.EXE 31 PID 1016 wrote to memory of 1372 1016 SVCH0ST.EXE 32 PID 1016 wrote to memory of 1372 1016 SVCH0ST.EXE 32 PID 1016 wrote to memory of 1372 1016 SVCH0ST.EXE 32 PID 1016 wrote to memory of 1372 1016 SVCH0ST.EXE 32 PID 1372 wrote to memory of 2028 1372 SVCH0ST.EXE 33 PID 1372 wrote to memory of 2028 1372 SVCH0ST.EXE 33 PID 1372 wrote to memory of 2028 1372 SVCH0ST.EXE 33 PID 1372 wrote to memory of 2028 1372 SVCH0ST.EXE 33 PID 2028 wrote to memory of 1888 2028 SVCH0ST.EXE 34 PID 2028 wrote to memory of 1888 2028 SVCH0ST.EXE 34 PID 2028 wrote to memory of 1888 2028 SVCH0ST.EXE 34 PID 2028 wrote to memory of 1888 2028 SVCH0ST.EXE 34 PID 1888 wrote to memory of 676 1888 SVCH0ST.EXE 35 PID 1888 wrote to memory of 676 1888 SVCH0ST.EXE 35 PID 1888 wrote to memory of 676 1888 SVCH0ST.EXE 35 PID 1888 wrote to memory of 676 1888 SVCH0ST.EXE 35 PID 676 wrote to memory of 1576 676 SVCH0ST.EXE 36 PID 676 wrote to memory of 1576 676 SVCH0ST.EXE 36 PID 676 wrote to memory of 1576 676 SVCH0ST.EXE 36 PID 676 wrote to memory of 1576 676 SVCH0ST.EXE 36 PID 1576 wrote to memory of 572 1576 SVCH0ST.EXE 37 PID 1576 wrote to memory of 572 1576 SVCH0ST.EXE 37 PID 1576 wrote to memory of 572 1576 SVCH0ST.EXE 37 PID 1576 wrote to memory of 572 1576 SVCH0ST.EXE 37 PID 572 wrote to memory of 1956 572 SVCH0ST.EXE 38 PID 572 wrote to memory of 1956 572 SVCH0ST.EXE 38 PID 572 wrote to memory of 1956 572 SVCH0ST.EXE 38 PID 572 wrote to memory of 1956 572 SVCH0ST.EXE 38 PID 1956 wrote to memory of 1360 1956 SVCH0ST.EXE 39 PID 1956 wrote to memory of 1360 1956 SVCH0ST.EXE 39 PID 1956 wrote to memory of 1360 1956 SVCH0ST.EXE 39 PID 1956 wrote to memory of 1360 1956 SVCH0ST.EXE 39 PID 1360 wrote to memory of 1020 1360 SVCH0ST.EXE 40 PID 1360 wrote to memory of 1020 1360 SVCH0ST.EXE 40 PID 1360 wrote to memory of 1020 1360 SVCH0ST.EXE 40 PID 1360 wrote to memory of 1020 1360 SVCH0ST.EXE 40 PID 1020 wrote to memory of 1704 1020 SVCH0ST.EXE 41 PID 1020 wrote to memory of 1704 1020 SVCH0ST.EXE 41 PID 1020 wrote to memory of 1704 1020 SVCH0ST.EXE 41 PID 1020 wrote to memory of 1704 1020 SVCH0ST.EXE 41 PID 1704 wrote to memory of 2032 1704 SVCH0ST.EXE 42 PID 1704 wrote to memory of 2032 1704 SVCH0ST.EXE 42 PID 1704 wrote to memory of 2032 1704 SVCH0ST.EXE 42 PID 1704 wrote to memory of 2032 1704 SVCH0ST.EXE 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\9672f07998972e5b99344a9e68b8024fa3ac9715195ecf90c74d9dceda72d9a6.exe"C:\Users\Admin\AppData\Local\Temp\9672f07998972e5b99344a9e68b8024fa3ac9715195ecf90c74d9dceda72d9a6.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:572 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1628 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1772 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:756 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1144 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1308 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1760 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:664 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1828 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1784 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:736 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1632 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1384 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1364 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"33⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"34⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:884 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"35⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"36⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"37⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"38⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"39⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:812 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"40⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"41⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:928 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"42⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:432 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"44⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1400 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1896 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"46⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:776 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"47⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1664 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"49⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1492 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"50⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:588 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"51⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1560 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"52⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:620 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"53⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1364 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"54⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1912 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"55⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1700 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"56⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1332 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"57⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"58⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"59⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:680 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"60⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1188 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"61⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1796 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"62⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:564 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"63⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"64⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:816 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"65⤵
- Executes dropped EXE
PID:1308 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"66⤵PID:2028
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"67⤵PID:1896
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"68⤵PID:1884
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"69⤵PID:1580
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"70⤵PID:560
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"71⤵PID:1576
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"72⤵PID:1496
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"73⤵PID:1824
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"74⤵PID:1632
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"75⤵PID:296
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"76⤵PID:1020
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"77⤵PID:1216
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"78⤵PID:1744
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"79⤵PID:1736
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"80⤵PID:1752
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"81⤵
- Drops file in System32 directory
PID:864 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"82⤵PID:1628
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"83⤵PID:952
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"84⤵PID:1772
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"85⤵PID:1064
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"86⤵PID:1852
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"87⤵PID:788
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"88⤵PID:1636
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"89⤵PID:1372
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"90⤵PID:1172
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"91⤵PID:2028
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"92⤵
- Drops file in System32 directory
PID:1844 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"93⤵PID:1248
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"94⤵PID:1340
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"95⤵PID:1808
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"96⤵
- Drops file in System32 directory
PID:340 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"97⤵
- Drops file in System32 directory
PID:1836 -
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"98⤵PID:1164
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"99⤵PID:1632
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"100⤵PID:620
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"101⤵PID:1212
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"102⤵PID:1876
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"103⤵PID:1700
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"104⤵PID:1860
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"105⤵PID:1680
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"106⤵PID:1712
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"107⤵PID:1604
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"108⤵PID:1568
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"109⤵PID:812
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"110⤵PID:564
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"111⤵PID:1900
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"112⤵PID:1944
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"113⤵PID:432
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"114⤵PID:816
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"115⤵PID:1308
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"116⤵PID:1800
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"117⤵PID:1840
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"118⤵PID:1856
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"119⤵PID:1784
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"120⤵PID:736
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"121⤵PID:588
-
C:\WINDOWS\SysWOW64\SVCH0ST.EXE"C:\WINDOWS\SYSTEM32\SVCH0ST.EXE"122⤵PID:1300
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-