Analysis
-
max time kernel
97s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2022 17:03
Behavioral task
behavioral1
Sample
3b10978c0266d0ce9de63361b427117a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3b10978c0266d0ce9de63361b427117a.exe
Resource
win10v2004-20220901-en
General
-
Target
3b10978c0266d0ce9de63361b427117a.exe
-
Size
586KB
-
MD5
3b10978c0266d0ce9de63361b427117a
-
SHA1
47f2e9ca3c71ad001d176e43ead92e7473f088c7
-
SHA256
95d139480818083ccfbacde06e5788218452f007f7befc76f975b013e7217fde
-
SHA512
eb71e4c9002160e3a7ca458e8f6c1449e1253141b826ba05f8e2f7baf8c60978851f745f21121d37d0d6bacf2cfca2dc4bdd5c8e98aee89c6aa23ad98651a553
-
SSDEEP
12288:h7d4Mcp7IJfKECTsFzQt+JrPGr7zMgF9YTaSenaUepaUepaS7W:gMcOJpCTGzQt+YQE9oaSYaUmaUmaz
Malware Config
Signatures
-
Detect Neshta payload 43 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\odt\office2016setup.exe family_neshta C:\Windows\svchost.com family_neshta C:\odt\OFFICE~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE family_neshta C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe family_neshta C:\PROGRA~2\MOZILL~1\UNINST~1.EXE family_neshta C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13167~1.21\MICROS~1.EXE family_neshta C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MI9C33~1.EXE family_neshta C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~2.EXE family_neshta C:\Windows\svchost.com family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
3b10978c0266d0ce9de63361b427117a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 3b10978c0266d0ce9de63361b427117a.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
3b10978c0266d0ce9de63361b427117a.exesvchost.exe3b10978c0266d0ce9de63361b427117a.exesvchost.exesvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEpid process 4888 3b10978c0266d0ce9de63361b427117a.exe 4800 svchost.exe 4020 3b10978c0266d0ce9de63361b427117a.exe 2376 svchost.exe 4128 svchost.com 3292 3B1097~1.EXE 3432 svchost.com 4592 3B1097~1.EXE 1512 svchost.com 4224 3B1097~1.EXE 212 svchost.com 2776 3B1097~1.EXE 552 svchost.com 1516 3B1097~1.EXE 1296 svchost.com 388 3B1097~1.EXE 2664 svchost.com 4540 3B1097~1.EXE 3708 svchost.com 5096 3B1097~1.EXE 3240 svchost.com 1132 3B1097~1.EXE 1728 svchost.com 4076 3B1097~1.EXE 4764 svchost.com 3712 3B1097~1.EXE 4280 svchost.com 4808 3B1097~1.EXE 452 svchost.com 4640 3B1097~1.EXE 4220 svchost.com 4832 3B1097~1.EXE 4092 svchost.com 3412 3B1097~1.EXE 3424 svchost.com 4456 3B1097~1.EXE 1808 svchost.com 4156 3B1097~1.EXE 3692 svchost.com 4548 3B1097~1.EXE 4772 svchost.com 2424 3B1097~1.EXE 3172 svchost.com 4140 3B1097~1.EXE 2228 svchost.com 4648 3B1097~1.EXE 1056 svchost.com 5100 3B1097~1.EXE 1484 svchost.com 4540 3B1097~1.EXE 3548 svchost.com 1452 3B1097~1.EXE 1520 svchost.com 3132 3B1097~1.EXE 772 svchost.com 2724 3B1097~1.EXE 2016 svchost.com 4732 3B1097~1.EXE 5072 svchost.com 5020 3B1097~1.EXE 4816 svchost.com 3148 3B1097~1.EXE 3200 svchost.com 3960 3B1097~1.EXE -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEsvchost.com3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEsvchost.comsvchost.com3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3b10978c0266d0ce9de63361b427117a.exe3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3b10978c0266d0ce9de63361b427117a.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3B1097~1.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
3b10978c0266d0ce9de63361b427117a.exe3b10978c0266d0ce9de63361b427117a.exesvchost.exedescription ioc process File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MI9C33~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe svchost.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MIA062~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe svchost.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~4.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~4.EXE 3b10978c0266d0ce9de63361b427117a.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.comsvchost.comsvchost.com3B1097~1.EXEsvchost.com3b10978c0266d0ce9de63361b427117a.exesvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.comsvchost.comsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEsvchost.com3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com3B1097~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com3B1097~1.EXE3B1097~1.EXEsvchost.comdescription ioc process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
Processes:
svchost.com3b10978c0266d0ce9de63361b427117a.exe3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEsvchost.com3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEsvchost.com3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEsvchost.com3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 3b10978c0266d0ce9de63361b427117a.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3B1097~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3b10978c0266d0ce9de63361b427117a.exe3b10978c0266d0ce9de63361b427117a.exesvchost.exe3b10978c0266d0ce9de63361b427117a.exesvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEdescription pid process target process PID 620 wrote to memory of 4888 620 3b10978c0266d0ce9de63361b427117a.exe 3b10978c0266d0ce9de63361b427117a.exe PID 620 wrote to memory of 4888 620 3b10978c0266d0ce9de63361b427117a.exe 3b10978c0266d0ce9de63361b427117a.exe PID 620 wrote to memory of 4888 620 3b10978c0266d0ce9de63361b427117a.exe 3b10978c0266d0ce9de63361b427117a.exe PID 4888 wrote to memory of 4800 4888 3b10978c0266d0ce9de63361b427117a.exe svchost.exe PID 4888 wrote to memory of 4800 4888 3b10978c0266d0ce9de63361b427117a.exe svchost.exe PID 4888 wrote to memory of 4800 4888 3b10978c0266d0ce9de63361b427117a.exe svchost.exe PID 4800 wrote to memory of 4020 4800 svchost.exe 3b10978c0266d0ce9de63361b427117a.exe PID 4800 wrote to memory of 4020 4800 svchost.exe 3b10978c0266d0ce9de63361b427117a.exe PID 4800 wrote to memory of 4020 4800 svchost.exe 3b10978c0266d0ce9de63361b427117a.exe PID 4020 wrote to memory of 4128 4020 3b10978c0266d0ce9de63361b427117a.exe svchost.com PID 4020 wrote to memory of 4128 4020 3b10978c0266d0ce9de63361b427117a.exe svchost.com PID 4020 wrote to memory of 4128 4020 3b10978c0266d0ce9de63361b427117a.exe svchost.com PID 4128 wrote to memory of 3292 4128 svchost.com 3B1097~1.EXE PID 4128 wrote to memory of 3292 4128 svchost.com 3B1097~1.EXE PID 4128 wrote to memory of 3292 4128 svchost.com 3B1097~1.EXE PID 3292 wrote to memory of 3432 3292 3B1097~1.EXE svchost.com PID 3292 wrote to memory of 3432 3292 3B1097~1.EXE svchost.com PID 3292 wrote to memory of 3432 3292 3B1097~1.EXE svchost.com PID 3432 wrote to memory of 4592 3432 svchost.com 3B1097~1.EXE PID 3432 wrote to memory of 4592 3432 svchost.com 3B1097~1.EXE PID 3432 wrote to memory of 4592 3432 svchost.com 3B1097~1.EXE PID 4592 wrote to memory of 1512 4592 3B1097~1.EXE svchost.com PID 4592 wrote to memory of 1512 4592 3B1097~1.EXE svchost.com PID 4592 wrote to memory of 1512 4592 3B1097~1.EXE svchost.com PID 1512 wrote to memory of 4224 1512 svchost.com 3B1097~1.EXE PID 1512 wrote to memory of 4224 1512 svchost.com 3B1097~1.EXE PID 1512 wrote to memory of 4224 1512 svchost.com 3B1097~1.EXE PID 4224 wrote to memory of 212 4224 3B1097~1.EXE svchost.com PID 4224 wrote to memory of 212 4224 3B1097~1.EXE svchost.com PID 4224 wrote to memory of 212 4224 3B1097~1.EXE svchost.com PID 212 wrote to memory of 2776 212 svchost.com 3B1097~1.EXE PID 212 wrote to memory of 2776 212 svchost.com 3B1097~1.EXE PID 212 wrote to memory of 2776 212 svchost.com 3B1097~1.EXE PID 2776 wrote to memory of 552 2776 3B1097~1.EXE svchost.com PID 2776 wrote to memory of 552 2776 3B1097~1.EXE svchost.com PID 2776 wrote to memory of 552 2776 3B1097~1.EXE svchost.com PID 552 wrote to memory of 1516 552 svchost.com 3B1097~1.EXE PID 552 wrote to memory of 1516 552 svchost.com 3B1097~1.EXE PID 552 wrote to memory of 1516 552 svchost.com 3B1097~1.EXE PID 1516 wrote to memory of 1296 1516 3B1097~1.EXE svchost.com PID 1516 wrote to memory of 1296 1516 3B1097~1.EXE svchost.com PID 1516 wrote to memory of 1296 1516 3B1097~1.EXE svchost.com PID 1296 wrote to memory of 388 1296 svchost.com 3B1097~1.EXE PID 1296 wrote to memory of 388 1296 svchost.com 3B1097~1.EXE PID 1296 wrote to memory of 388 1296 svchost.com 3B1097~1.EXE PID 388 wrote to memory of 2664 388 3B1097~1.EXE svchost.com PID 388 wrote to memory of 2664 388 3B1097~1.EXE svchost.com PID 388 wrote to memory of 2664 388 3B1097~1.EXE svchost.com PID 2664 wrote to memory of 4540 2664 svchost.com 3B1097~1.EXE PID 2664 wrote to memory of 4540 2664 svchost.com 3B1097~1.EXE PID 2664 wrote to memory of 4540 2664 svchost.com 3B1097~1.EXE PID 4540 wrote to memory of 3708 4540 3B1097~1.EXE svchost.com PID 4540 wrote to memory of 3708 4540 3B1097~1.EXE svchost.com PID 4540 wrote to memory of 3708 4540 3B1097~1.EXE svchost.com PID 3708 wrote to memory of 5096 3708 svchost.com 3B1097~1.EXE PID 3708 wrote to memory of 5096 3708 svchost.com 3B1097~1.EXE PID 3708 wrote to memory of 5096 3708 svchost.com 3B1097~1.EXE PID 5096 wrote to memory of 3240 5096 3B1097~1.EXE svchost.com PID 5096 wrote to memory of 3240 5096 3B1097~1.EXE svchost.com PID 5096 wrote to memory of 3240 5096 3B1097~1.EXE svchost.com PID 3240 wrote to memory of 1132 3240 svchost.com 3B1097~1.EXE PID 3240 wrote to memory of 1132 3240 svchost.com 3B1097~1.EXE PID 3240 wrote to memory of 1132 3240 svchost.com 3B1097~1.EXE PID 1132 wrote to memory of 1728 1132 3B1097~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b10978c0266d0ce9de63361b427117a.exe"C:\Users\Admin\AppData\Local\Temp\3b10978c0266d0ce9de63361b427117a.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE10⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE14⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE16⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE18⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE20⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE22⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"23⤵
- Executes dropped EXE
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE24⤵
- Executes dropped EXE
- Checks computer location settings
PID:4076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"25⤵
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE26⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:3712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
PID:4808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"29⤵
- Executes dropped EXE
PID:452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2376
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE1⤵
- Executes dropped EXE
- Modifies registry class
PID:4640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"2⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE3⤵
- Executes dropped EXE
PID:4832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE5⤵
- Executes dropped EXE
- Checks computer location settings
PID:3412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"6⤵
- Executes dropped EXE
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE7⤵PID:4456
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"8⤵
- Executes dropped EXE
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE9⤵
- Executes dropped EXE
- Modifies registry class
PID:4156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"10⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE11⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"12⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2424 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"14⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE15⤵
- Executes dropped EXE
- Modifies registry class
PID:4140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"16⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE17⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:4648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"18⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE19⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:5100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"20⤵
- Executes dropped EXE
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE21⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"22⤵
- Executes dropped EXE
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE23⤵
- Executes dropped EXE
PID:1452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"24⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE25⤵
- Executes dropped EXE
- Modifies registry class
PID:3132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"26⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE27⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:2724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"28⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE29⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:4732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"30⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"32⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE33⤵
- Executes dropped EXE
- Checks computer location settings
PID:3148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"34⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE35⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"36⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE37⤵
- Checks computer location settings
- Modifies registry class
PID:652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"38⤵
- Drops file in Windows directory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE39⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:4456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"40⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE41⤵PID:3492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"42⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE43⤵
- Modifies registry class
PID:4592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"44⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE45⤵
- Checks computer location settings
- Modifies registry class
PID:4140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"46⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE47⤵
- Drops file in Windows directory
- Modifies registry class
PID:1296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"48⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE49⤵
- Checks computer location settings
- Modifies registry class
PID:2404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"50⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE51⤵PID:4752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"52⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE53⤵
- Checks computer location settings
PID:932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"54⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE55⤵
- Modifies registry class
PID:1488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"56⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE57⤵PID:800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"58⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE59⤵PID:2628
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"60⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE61⤵PID:3300
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"62⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE63⤵PID:452
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"64⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE65⤵PID:3200
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"66⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE67⤵
- Drops file in Windows directory
- Modifies registry class
PID:3588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"68⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE69⤵
- Checks computer location settings
- Modifies registry class
PID:4156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"70⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE71⤵
- Checks computer location settings
- Modifies registry class
PID:372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"72⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE73⤵
- Checks computer location settings
- Modifies registry class
PID:3504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"74⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE75⤵
- Checks computer location settings
PID:1408 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"76⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE77⤵
- Modifies registry class
PID:3024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"78⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE79⤵
- Checks computer location settings
PID:4648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"80⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE81⤵PID:2024
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"82⤵
- Drops file in Windows directory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE83⤵PID:1084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"84⤵
- Drops file in Windows directory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE85⤵PID:4084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"86⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE87⤵PID:3936
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"88⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE89⤵
- Checks computer location settings
PID:2768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"90⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE91⤵
- Drops file in Windows directory
- Modifies registry class
PID:2416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"92⤵
- Drops file in Windows directory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE93⤵
- Modifies registry class
PID:1728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"94⤵
- Checks computer location settings
- Drops file in Windows directory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE95⤵
- Checks computer location settings
PID:2984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"96⤵
- Drops file in Windows directory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE97⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3244 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"98⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE99⤵PID:3688
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"100⤵
- Drops file in Windows directory
- Modifies registry class
PID:452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE101⤵
- Drops file in Windows directory
PID:2464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"102⤵
- Modifies registry class
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE103⤵
- Checks computer location settings
- Modifies registry class
PID:1056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"104⤵
- Drops file in Windows directory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE105⤵
- Modifies registry class
PID:4828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"106⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE107⤵PID:3432
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"108⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE109⤵PID:3356
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"110⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE111⤵PID:4512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"112⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE113⤵PID:752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"114⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE115⤵PID:2452
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"116⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE117⤵
- Drops file in Windows directory
PID:4484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"118⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE119⤵PID:4424
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"120⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE121⤵PID:3548
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"122⤵PID:2780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-