Analysis
-
max time kernel
151s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 12:27
Behavioral task
behavioral1
Sample
da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe
Resource
win10v2004-20220901-en
General
-
Target
da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe
-
Size
2.2MB
-
MD5
6ed2d62634ee34e6508fc3b5f4a6f5a2
-
SHA1
57eae1c641986e8ecc3c9e1d868f2090e7c09d4a
-
SHA256
da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d
-
SHA512
a4cd7198df0ff8cabc57d16d386a6ffb81ce23fb3df5f68e223b1c59e6910c1d6fcf1f7390c5706da28a8c7882e3868a79aa97a3ff3809f6eb5bd7b327994529
-
SSDEEP
24576:iW4ACGKuql91OaNxRyZG8aiu/Hihy67pCXnJvsp9okJVXHWQZRVxZJkJi5INi177:igCGKEE4y6EyJXPKA7wl/o
Malware Config
Signatures
-
Detect Neshta payload 49 IoCs
resource yara_rule behavioral1/files/0x000b0000000122ff-55.dat family_neshta behavioral1/files/0x000b0000000122ff-56.dat family_neshta behavioral1/files/0x000b0000000122ff-58.dat family_neshta behavioral1/files/0x000b0000000122ff-60.dat family_neshta behavioral1/files/0x000900000001230d-61.dat family_neshta behavioral1/files/0x000900000001230d-63.dat family_neshta behavioral1/files/0x000700000001048b-64.dat family_neshta behavioral1/files/0x0001000000010322-67.dat family_neshta behavioral1/files/0x0001000000010320-66.dat family_neshta behavioral1/files/0x0001000000010544-65.dat family_neshta behavioral1/files/0x000b0000000122ff-69.dat family_neshta behavioral1/files/0x000b0000000122ff-70.dat family_neshta behavioral1/files/0x000b0000000122ff-72.dat family_neshta behavioral1/files/0x000900000001230d-76.dat family_neshta behavioral1/files/0x000b0000000122ff-82.dat family_neshta behavioral1/files/0x000b0000000122ff-80.dat family_neshta behavioral1/files/0x000b0000000122ff-79.dat family_neshta behavioral1/files/0x000900000001230d-86.dat family_neshta behavioral1/files/0x000b0000000122ff-92.dat family_neshta behavioral1/files/0x000b0000000122ff-90.dat family_neshta behavioral1/files/0x000b0000000122ff-89.dat family_neshta behavioral1/files/0x000900000001230d-96.dat family_neshta behavioral1/files/0x000b0000000122ff-99.dat family_neshta behavioral1/files/0x000b0000000122ff-102.dat family_neshta behavioral1/files/0x000b0000000122ff-100.dat family_neshta behavioral1/files/0x000900000001230d-105.dat family_neshta behavioral1/files/0x000b0000000122ff-112.dat family_neshta behavioral1/files/0x000b0000000122ff-110.dat family_neshta behavioral1/files/0x000b0000000122ff-109.dat family_neshta behavioral1/files/0x000900000001230d-116.dat family_neshta behavioral1/files/0x000b0000000122ff-119.dat family_neshta behavioral1/files/0x000b0000000122ff-122.dat family_neshta behavioral1/files/0x000b0000000122ff-120.dat family_neshta behavioral1/files/0x000900000001230d-126.dat family_neshta behavioral1/files/0x000100000000f7e8-129.dat family_neshta behavioral1/files/0x000b0000000122ff-139.dat family_neshta behavioral1/files/0x000100000000f713-138.dat family_neshta behavioral1/files/0x000100000000f713-140.dat family_neshta behavioral1/files/0x000b0000000122ff-136.dat family_neshta behavioral1/files/0x000b0000000122ff-135.dat family_neshta behavioral1/files/0x000100000000f883-142.dat family_neshta behavioral1/files/0x000100000000f7f6-132.dat family_neshta behavioral1/files/0x000100000000f7da-131.dat family_neshta behavioral1/files/0x000100000000f786-130.dat family_neshta behavioral1/files/0x0001000000010ba0-143.dat family_neshta behavioral1/files/0x000100000001036e-144.dat family_neshta behavioral1/files/0x000900000001230d-146.dat family_neshta behavioral1/files/0x0001000000010c1e-149.dat family_neshta behavioral1/files/0x0001000000011809-150.dat family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
pid Process 1924 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 1504 svchost.com 1492 DA1985~1.EXE 820 svchost.com 568 DA1985~1.EXE 892 svchost.com 396 DA1985~1.EXE 272 DA1985~1.EXE 1016 DA1985~1.EXE 1080 svchost.com 1052 DA1985~1.EXE 1988 svchost.com 1532 DA1985~1.EXE 836 svchost.com 1384 DA1985~1.EXE 1416 svchost.com 2036 DA1985~1.EXE 1580 svchost.com 1760 DA1985~1.EXE 1168 svchost.com 1388 DA1985~1.EXE 1740 svchost.com 1768 DA1985~1.EXE 1712 svchost.com 344 DA1985~1.EXE 436 svchost.com 396 DA1985~1.EXE 968 svchost.com 272 DA1985~1.EXE 1320 svchost.com 1664 DA1985~1.EXE 1080 svchost.com 1052 DA1985~1.EXE 1620 svchost.com 1596 DA1985~1.EXE 1764 svchost.com 1532 DA1985~1.EXE 1944 svchost.com 2032 DA1985~1.EXE 1964 svchost.com 1904 DA1985~1.EXE 772 svchost.com 1020 DA1985~1.EXE 1796 svchost.com 1572 DA1985~1.EXE 1580 svchost.com 1760 DA1985~1.EXE 1444 svchost.com 1248 DA1985~1.EXE 1364 svchost.com 1196 DA1985~1.EXE 620 svchost.com 892 DA1985~1.EXE 1744 svchost.com 1680 DA1985~1.EXE 1016 svchost.com 656 DA1985~1.EXE 756 svchost.com 1912 DA1985~1.EXE 2012 svchost.com 1052 DA1985~1.EXE 956 svchost.com 1596 DA1985~1.EXE 1764 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 1916 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 1916 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 1504 svchost.com 1504 svchost.com 820 svchost.com 820 svchost.com 892 svchost.com 892 svchost.com 272 DA1985~1.EXE 272 DA1985~1.EXE 1080 svchost.com 1080 svchost.com 1988 svchost.com 1988 svchost.com 1916 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 1924 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 836 svchost.com 836 svchost.com 1916 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 1416 svchost.com 1416 svchost.com 1580 svchost.com 1580 svchost.com 1168 svchost.com 1168 svchost.com 1740 svchost.com 1740 svchost.com 1712 svchost.com 1712 svchost.com 436 svchost.com 436 svchost.com 968 svchost.com 968 svchost.com 1320 svchost.com 1320 svchost.com 1080 svchost.com 1080 svchost.com 1620 svchost.com 1620 svchost.com 1764 svchost.com 1764 svchost.com 1944 svchost.com 1944 svchost.com 1964 svchost.com 1964 svchost.com 1916 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 772 svchost.com 772 svchost.com 1916 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 1916 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 1796 svchost.com 1796 svchost.com 1580 svchost.com 1580 svchost.com 1444 svchost.com 1444 svchost.com 1364 svchost.com 1364 svchost.com 620 svchost.com 620 svchost.com 1744 svchost.com 1744 svchost.com 1016 svchost.com 1016 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com DA1985~1.EXE File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\directx.sys DA1985~1.EXE File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\directx.sys DA1985~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com DA1985~1.EXE File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com DA1985~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com DA1985~1.EXE File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\directx.sys DA1985~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys DA1985~1.EXE File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com DA1985~1.EXE File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys DA1985~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com DA1985~1.EXE File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys DA1985~1.EXE File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\svchost.com DA1985~1.EXE File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\directx.sys DA1985~1.EXE File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com DA1985~1.EXE File opened for modification C:\Windows\svchost.com DA1985~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1924 1916 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 27 PID 1916 wrote to memory of 1924 1916 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 27 PID 1916 wrote to memory of 1924 1916 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 27 PID 1916 wrote to memory of 1924 1916 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 27 PID 1924 wrote to memory of 1504 1924 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 28 PID 1924 wrote to memory of 1504 1924 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 28 PID 1924 wrote to memory of 1504 1924 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 28 PID 1924 wrote to memory of 1504 1924 da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe 28 PID 1504 wrote to memory of 1492 1504 svchost.com 29 PID 1504 wrote to memory of 1492 1504 svchost.com 29 PID 1504 wrote to memory of 1492 1504 svchost.com 29 PID 1504 wrote to memory of 1492 1504 svchost.com 29 PID 1492 wrote to memory of 820 1492 DA1985~1.EXE 30 PID 1492 wrote to memory of 820 1492 DA1985~1.EXE 30 PID 1492 wrote to memory of 820 1492 DA1985~1.EXE 30 PID 1492 wrote to memory of 820 1492 DA1985~1.EXE 30 PID 820 wrote to memory of 568 820 svchost.com 31 PID 820 wrote to memory of 568 820 svchost.com 31 PID 820 wrote to memory of 568 820 svchost.com 31 PID 820 wrote to memory of 568 820 svchost.com 31 PID 568 wrote to memory of 892 568 DA1985~1.EXE 32 PID 568 wrote to memory of 892 568 DA1985~1.EXE 32 PID 568 wrote to memory of 892 568 DA1985~1.EXE 32 PID 568 wrote to memory of 892 568 DA1985~1.EXE 32 PID 892 wrote to memory of 396 892 svchost.com 53 PID 892 wrote to memory of 396 892 svchost.com 53 PID 892 wrote to memory of 396 892 svchost.com 53 PID 892 wrote to memory of 396 892 svchost.com 53 PID 396 wrote to memory of 272 396 DA1985~1.EXE 55 PID 396 wrote to memory of 272 396 DA1985~1.EXE 55 PID 396 wrote to memory of 272 396 DA1985~1.EXE 55 PID 396 wrote to memory of 272 396 DA1985~1.EXE 55 PID 272 wrote to memory of 1016 272 DA1985~1.EXE 36 PID 272 wrote to memory of 1016 272 DA1985~1.EXE 36 PID 272 wrote to memory of 1016 272 DA1985~1.EXE 36 PID 272 wrote to memory of 1016 272 DA1985~1.EXE 36 PID 1016 wrote to memory of 1080 1016 DA1985~1.EXE 58 PID 1016 wrote to memory of 1080 1016 DA1985~1.EXE 58 PID 1016 wrote to memory of 1080 1016 DA1985~1.EXE 58 PID 1016 wrote to memory of 1080 1016 DA1985~1.EXE 58 PID 1080 wrote to memory of 1052 1080 svchost.com 59 PID 1080 wrote to memory of 1052 1080 svchost.com 59 PID 1080 wrote to memory of 1052 1080 svchost.com 59 PID 1080 wrote to memory of 1052 1080 svchost.com 59 PID 1052 wrote to memory of 1988 1052 DA1985~1.EXE 39 PID 1052 wrote to memory of 1988 1052 DA1985~1.EXE 39 PID 1052 wrote to memory of 1988 1052 DA1985~1.EXE 39 PID 1052 wrote to memory of 1988 1052 DA1985~1.EXE 39 PID 1988 wrote to memory of 1532 1988 svchost.com 63 PID 1988 wrote to memory of 1532 1988 svchost.com 63 PID 1988 wrote to memory of 1532 1988 svchost.com 63 PID 1988 wrote to memory of 1532 1988 svchost.com 63 PID 1532 wrote to memory of 836 1532 DA1985~1.EXE 40 PID 1532 wrote to memory of 836 1532 DA1985~1.EXE 40 PID 1532 wrote to memory of 836 1532 DA1985~1.EXE 40 PID 1532 wrote to memory of 836 1532 DA1985~1.EXE 40 PID 836 wrote to memory of 1384 836 svchost.com 41 PID 836 wrote to memory of 1384 836 svchost.com 41 PID 836 wrote to memory of 1384 836 svchost.com 41 PID 836 wrote to memory of 1384 836 svchost.com 41 PID 1384 wrote to memory of 1416 1384 DA1985~1.EXE 42 PID 1384 wrote to memory of 1416 1384 DA1985~1.EXE 42 PID 1384 wrote to memory of 1416 1384 DA1985~1.EXE 42 PID 1384 wrote to memory of 1416 1384 DA1985~1.EXE 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe"C:\Users\Admin\AppData\Local\Temp\da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\da198563553626283f2ef0d2e10228f02a5becd2b988bf833ad2af3a301fbe6d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE8⤵PID:396
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"9⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016
-
-
-
-
-
-
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"1⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE2⤵PID:1052
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988
-
-
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE1⤵PID:1532
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE5⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"6⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE7⤵PID:1760
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1168
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE1⤵
- Executes dropped EXE
PID:1388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE3⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE1⤵
- Executes dropped EXE
PID:344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE7⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE11⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE15⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE17⤵
- Executes dropped EXE
PID:1904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE19⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE21⤵
- Executes dropped EXE
PID:1572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE23⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE25⤵
- Executes dropped EXE
PID:1248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE27⤵
- Executes dropped EXE
PID:1196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE29⤵
- Executes dropped EXE
PID:892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE31⤵
- Executes dropped EXE
PID:1680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE33⤵
- Executes dropped EXE
PID:656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"34⤵
- Executes dropped EXE
PID:756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE35⤵
- Executes dropped EXE
PID:1912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"36⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE37⤵
- Executes dropped EXE
PID:1052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"38⤵
- Executes dropped EXE
PID:956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE39⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"40⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE41⤵PID:1360
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"42⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE43⤵PID:1452
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"44⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE45⤵PID:544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"46⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE47⤵PID:772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"48⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE49⤵PID:752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"50⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE51⤵PID:1700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"52⤵
- Drops file in Windows directory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE53⤵PID:320
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"54⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE55⤵PID:1248
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"56⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE57⤵PID:1364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"58⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE59⤵PID:1560
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"60⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE61⤵PID:984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"62⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE63⤵PID:1428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"64⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE65⤵PID:1720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"66⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE67⤵PID:472
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"68⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE69⤵PID:580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"70⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE71⤵PID:1040
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"72⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE73⤵PID:1596
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"74⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE75⤵PID:1592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"76⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE77⤵PID:1452
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"78⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE79⤵PID:544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"80⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE81⤵PID:1584
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"82⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE83⤵PID:1120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"84⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE85⤵PID:2024
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"86⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE87⤵PID:320
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"88⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE89⤵PID:1168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"90⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE91⤵PID:1364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"92⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE93⤵PID:1560
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"94⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE95⤵PID:984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"96⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE97⤵PID:1016
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"98⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE99⤵PID:1068
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"100⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE101⤵PID:1080
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"102⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE103⤵PID:644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"104⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE105⤵PID:388
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"106⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE107⤵PID:1360
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"108⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE109⤵PID:1092
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"110⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE111⤵PID:1456
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"112⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE113⤵PID:1308
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"114⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE115⤵PID:1572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"116⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE117⤵PID:1120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"118⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE119⤵PID:2024
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"120⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE121⤵PID:1196
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DA1985~1.EXE"122⤵PID:1168
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-