Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-10-2022 17:57
Behavioral task
behavioral1
Sample
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe
Resource
win10v2004-20220901-en
General
-
Target
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe
-
Size
331KB
-
MD5
06a1ff466c12643060a9378cd51ca7c0
-
SHA1
d89c51b158fa2a67eaeb0111456292e6a6f73a89
-
SHA256
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316
-
SHA512
73b2c7a01e55d3b1df03b7f36c04f4cc1e233a180a4369cbb69f7ca73c5a00120b4230980b0fd9ab0cd4ac565bc6dff8194482dbb3b1e3d501a2362469b279d1
-
SSDEEP
6144:k9ZiIeqZUKRm1J0XhWqoDTUvaBMifp2BRvEmE9:UiIeNWiJ0XhWl0vKTiRvEm
Malware Config
Signatures
-
Detect Neshta payload 46 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta \MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exesvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.compid process 1072 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe 1756 svchost.com 1060 FCFEA3~1.EXE 1488 svchost.com 1296 FCFEA3~1.EXE 1120 svchost.com 756 FCFEA3~1.EXE 1560 svchost.com 876 FCFEA3~1.EXE 1920 svchost.com 928 FCFEA3~1.EXE 1220 svchost.com 1764 FCFEA3~1.EXE 1904 svchost.com 556 FCFEA3~1.EXE 1304 svchost.com 1556 FCFEA3~1.EXE 1748 svchost.com 1048 FCFEA3~1.EXE 1448 svchost.com 1648 FCFEA3~1.EXE 1872 svchost.com 332 FCFEA3~1.EXE 1296 svchost.com 1604 FCFEA3~1.EXE 696 svchost.com 1516 FCFEA3~1.EXE 2020 svchost.com 340 FCFEA3~1.EXE 1940 svchost.com 304 FCFEA3~1.EXE 784 svchost.com 968 FCFEA3~1.EXE 524 svchost.com 1528 FCFEA3~1.EXE 1972 svchost.com 1308 FCFEA3~1.EXE 988 svchost.com 1544 FCFEA3~1.EXE 560 svchost.com 1664 FCFEA3~1.EXE 824 svchost.com 1124 FCFEA3~1.EXE 2012 svchost.com 2008 FCFEA3~1.EXE 608 svchost.com 1020 FCFEA3~1.EXE 320 svchost.com 572 FCFEA3~1.EXE 1712 svchost.com 332 FCFEA3~1.EXE 1688 svchost.com 1604 FCFEA3~1.EXE 1044 svchost.com 1516 FCFEA3~1.EXE 1540 svchost.com 340 FCFEA3~1.EXE 876 svchost.com 304 FCFEA3~1.EXE 784 svchost.com 1168 FCFEA3~1.EXE 928 svchost.com 1888 FCFEA3~1.EXE 672 svchost.com -
Loads dropped DLL 64 IoCs
Processes:
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comfcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.compid process 752 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe 752 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe 1756 svchost.com 1756 svchost.com 1488 svchost.com 752 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe 1488 svchost.com 1120 svchost.com 1120 svchost.com 1560 svchost.com 1560 svchost.com 1920 svchost.com 1920 svchost.com 1220 svchost.com 1220 svchost.com 1904 svchost.com 1904 svchost.com 1304 svchost.com 1304 svchost.com 1748 svchost.com 1748 svchost.com 1448 svchost.com 1448 svchost.com 752 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe 1072 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe 1872 svchost.com 1872 svchost.com 1296 svchost.com 1296 svchost.com 752 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe 696 svchost.com 696 svchost.com 752 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe 2020 svchost.com 2020 svchost.com 752 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe 1940 svchost.com 1940 svchost.com 784 svchost.com 1072 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe 784 svchost.com 524 svchost.com 752 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe 524 svchost.com 1972 svchost.com 1972 svchost.com 988 svchost.com 752 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe 988 svchost.com 560 svchost.com 560 svchost.com 824 svchost.com 824 svchost.com 2012 svchost.com 2012 svchost.com 608 svchost.com 608 svchost.com 320 svchost.com 320 svchost.com 1712 svchost.com 1712 svchost.com 1688 svchost.com 1688 svchost.com 1044 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exefcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exedescription ioc process File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.comFCFEA3~1.EXEsvchost.comsvchost.comFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEsvchost.comsvchost.comsvchost.comFCFEA3~1.EXEFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEsvchost.comsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEdescription ioc process File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exefcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exesvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEdescription pid process target process PID 752 wrote to memory of 1072 752 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe PID 752 wrote to memory of 1072 752 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe PID 752 wrote to memory of 1072 752 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe PID 752 wrote to memory of 1072 752 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe PID 1072 wrote to memory of 1756 1072 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe svchost.com PID 1072 wrote to memory of 1756 1072 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe svchost.com PID 1072 wrote to memory of 1756 1072 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe svchost.com PID 1072 wrote to memory of 1756 1072 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe svchost.com PID 1756 wrote to memory of 1060 1756 svchost.com FCFEA3~1.EXE PID 1756 wrote to memory of 1060 1756 svchost.com FCFEA3~1.EXE PID 1756 wrote to memory of 1060 1756 svchost.com FCFEA3~1.EXE PID 1756 wrote to memory of 1060 1756 svchost.com FCFEA3~1.EXE PID 1060 wrote to memory of 1488 1060 FCFEA3~1.EXE svchost.com PID 1060 wrote to memory of 1488 1060 FCFEA3~1.EXE svchost.com PID 1060 wrote to memory of 1488 1060 FCFEA3~1.EXE svchost.com PID 1060 wrote to memory of 1488 1060 FCFEA3~1.EXE svchost.com PID 1488 wrote to memory of 1296 1488 svchost.com FCFEA3~1.EXE PID 1488 wrote to memory of 1296 1488 svchost.com FCFEA3~1.EXE PID 1488 wrote to memory of 1296 1488 svchost.com FCFEA3~1.EXE PID 1488 wrote to memory of 1296 1488 svchost.com FCFEA3~1.EXE PID 1296 wrote to memory of 1120 1296 FCFEA3~1.EXE svchost.com PID 1296 wrote to memory of 1120 1296 FCFEA3~1.EXE svchost.com PID 1296 wrote to memory of 1120 1296 FCFEA3~1.EXE svchost.com PID 1296 wrote to memory of 1120 1296 FCFEA3~1.EXE svchost.com PID 1120 wrote to memory of 756 1120 svchost.com FCFEA3~1.EXE PID 1120 wrote to memory of 756 1120 svchost.com FCFEA3~1.EXE PID 1120 wrote to memory of 756 1120 svchost.com FCFEA3~1.EXE PID 1120 wrote to memory of 756 1120 svchost.com FCFEA3~1.EXE PID 756 wrote to memory of 1560 756 FCFEA3~1.EXE svchost.com PID 756 wrote to memory of 1560 756 FCFEA3~1.EXE svchost.com PID 756 wrote to memory of 1560 756 FCFEA3~1.EXE svchost.com PID 756 wrote to memory of 1560 756 FCFEA3~1.EXE svchost.com PID 1560 wrote to memory of 876 1560 svchost.com FCFEA3~1.EXE PID 1560 wrote to memory of 876 1560 svchost.com FCFEA3~1.EXE PID 1560 wrote to memory of 876 1560 svchost.com FCFEA3~1.EXE PID 1560 wrote to memory of 876 1560 svchost.com FCFEA3~1.EXE PID 876 wrote to memory of 1920 876 FCFEA3~1.EXE svchost.com PID 876 wrote to memory of 1920 876 FCFEA3~1.EXE svchost.com PID 876 wrote to memory of 1920 876 FCFEA3~1.EXE svchost.com PID 876 wrote to memory of 1920 876 FCFEA3~1.EXE svchost.com PID 1920 wrote to memory of 928 1920 svchost.com FCFEA3~1.EXE PID 1920 wrote to memory of 928 1920 svchost.com FCFEA3~1.EXE PID 1920 wrote to memory of 928 1920 svchost.com FCFEA3~1.EXE PID 1920 wrote to memory of 928 1920 svchost.com FCFEA3~1.EXE PID 928 wrote to memory of 1220 928 FCFEA3~1.EXE svchost.com PID 928 wrote to memory of 1220 928 FCFEA3~1.EXE svchost.com PID 928 wrote to memory of 1220 928 FCFEA3~1.EXE svchost.com PID 928 wrote to memory of 1220 928 FCFEA3~1.EXE svchost.com PID 1220 wrote to memory of 1764 1220 svchost.com FCFEA3~1.EXE PID 1220 wrote to memory of 1764 1220 svchost.com FCFEA3~1.EXE PID 1220 wrote to memory of 1764 1220 svchost.com FCFEA3~1.EXE PID 1220 wrote to memory of 1764 1220 svchost.com FCFEA3~1.EXE PID 1764 wrote to memory of 1904 1764 FCFEA3~1.EXE svchost.com PID 1764 wrote to memory of 1904 1764 FCFEA3~1.EXE svchost.com PID 1764 wrote to memory of 1904 1764 FCFEA3~1.EXE svchost.com PID 1764 wrote to memory of 1904 1764 FCFEA3~1.EXE svchost.com PID 1904 wrote to memory of 556 1904 svchost.com FCFEA3~1.EXE PID 1904 wrote to memory of 556 1904 svchost.com FCFEA3~1.EXE PID 1904 wrote to memory of 556 1904 svchost.com FCFEA3~1.EXE PID 1904 wrote to memory of 556 1904 svchost.com FCFEA3~1.EXE PID 556 wrote to memory of 1304 556 FCFEA3~1.EXE svchost.com PID 556 wrote to memory of 1304 556 FCFEA3~1.EXE svchost.com PID 556 wrote to memory of 1304 556 FCFEA3~1.EXE svchost.com PID 556 wrote to memory of 1304 556 FCFEA3~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe"C:\Users\Admin\AppData\Local\Temp\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE18⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE20⤵
- Executes dropped EXE
PID:1048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE22⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE24⤵
- Executes dropped EXE
PID:332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE26⤵
- Executes dropped EXE
PID:1604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE28⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE30⤵
- Executes dropped EXE
PID:340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE32⤵
- Executes dropped EXE
PID:304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE36⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE38⤵
- Executes dropped EXE
PID:1308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE40⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE42⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE44⤵
- Executes dropped EXE
PID:1124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE46⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE48⤵
- Executes dropped EXE
PID:1020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE50⤵
- Executes dropped EXE
PID:572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE52⤵
- Executes dropped EXE
PID:332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE54⤵
- Executes dropped EXE
PID:1604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE56⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"57⤵
- Executes dropped EXE
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE58⤵
- Executes dropped EXE
PID:340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"59⤵
- Executes dropped EXE
PID:876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE60⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"61⤵
- Executes dropped EXE
PID:784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE62⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"63⤵
- Executes dropped EXE
PID:928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE64⤵
- Executes dropped EXE
PID:1888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"65⤵
- Executes dropped EXE
PID:672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE66⤵PID:788
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"67⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE68⤵PID:1116
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"69⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE70⤵PID:560
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"71⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE72⤵PID:824
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"73⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE74⤵PID:2040
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"75⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE76⤵PID:2036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"77⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE78⤵PID:1448
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"79⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE80⤵PID:572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"81⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE82⤵PID:1712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"83⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE84⤵PID:1472
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"85⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE86⤵PID:1384
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"87⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE88⤵PID:1560
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"89⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE90⤵PID:1940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"91⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE92⤵PID:840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"93⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE94⤵PID:1484
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"95⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE96⤵PID:1952
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"97⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE98⤵PID:1308
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"99⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE100⤵PID:544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"101⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE102⤵PID:988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"103⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE104⤵PID:952
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"105⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE106⤵PID:824
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"107⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE108⤵PID:2040
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"109⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE110⤵PID:1760
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"111⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE112⤵PID:812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"113⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE114⤵PID:1296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"115⤵
- Drops file in Windows directory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE116⤵PID:1604
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"117⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE118⤵PID:1816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"119⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE120⤵PID:1180
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"121⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE122⤵PID:1700
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-