Analysis
-
max time kernel
80s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
10-11-2022 01:06
Behavioral task
behavioral1
Sample
e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe
Resource
win10v2004-20220812-en
General
-
Target
e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe
-
Size
429KB
-
MD5
b88b8e449bb192a4e02dd49eb86d63d7
-
SHA1
143da397c9b972247147da79b11ae72b4dae07e8
-
SHA256
e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5
-
SHA512
ce4b54ab4266118e49153ac500cc0da92e5ca8fe32f25c7e91dbdd90da87f0ada32a020a42bc36ac98f64b6be3123d86e70c1c36fd888ed58c4f8fd184b4cbb1
-
SSDEEP
6144:k9rI7T8AzZV2MYORbAV9bQdnXgfyVQhAyPlb/F+bsn9:LIkEMtiQdwfyVQhAyPlb/wb
Malware Config
Signatures
-
Detect Neshta payload 49 IoCs
resource yara_rule behavioral1/files/0x000b00000001231c-55.dat family_neshta behavioral1/files/0x000b00000001231c-56.dat family_neshta behavioral1/files/0x000b00000001231c-58.dat family_neshta behavioral1/files/0x000b00000001231c-60.dat family_neshta behavioral1/files/0x00080000000126c8-61.dat family_neshta behavioral1/files/0x00080000000126c8-63.dat family_neshta behavioral1/files/0x000b00000001231c-70.dat family_neshta behavioral1/files/0x0001000000010322-68.dat family_neshta behavioral1/files/0x000b00000001231c-72.dat family_neshta behavioral1/files/0x0001000000010320-67.dat family_neshta behavioral1/files/0x0008000000010370-65.dat family_neshta behavioral1/files/0x0006000000010372-64.dat family_neshta behavioral1/files/0x000b00000001231c-69.dat family_neshta behavioral1/files/0x00080000000126c8-75.dat family_neshta behavioral1/files/0x000b00000001231c-79.dat family_neshta behavioral1/files/0x000b00000001231c-82.dat family_neshta behavioral1/files/0x000b00000001231c-80.dat family_neshta behavioral1/files/0x00080000000126c8-85.dat family_neshta behavioral1/files/0x000b00000001231c-90.dat family_neshta behavioral1/files/0x000b00000001231c-89.dat family_neshta behavioral1/files/0x000b00000001231c-92.dat family_neshta behavioral1/files/0x00080000000126c8-96.dat family_neshta behavioral1/files/0x000b00000001231c-100.dat family_neshta behavioral1/files/0x000b00000001231c-99.dat family_neshta behavioral1/files/0x000b00000001231c-102.dat family_neshta behavioral1/files/0x00080000000126c8-106.dat family_neshta behavioral1/files/0x000b00000001231c-109.dat family_neshta behavioral1/files/0x000b00000001231c-110.dat family_neshta behavioral1/files/0x000b00000001231c-112.dat family_neshta behavioral1/files/0x000100000000f7e5-114.dat family_neshta behavioral1/files/0x000100000000f788-115.dat family_neshta behavioral1/files/0x00080000000126c8-117.dat family_neshta behavioral1/files/0x000b00000001231c-123.dat family_neshta behavioral1/files/0x000b00000001231c-124.dat family_neshta behavioral1/files/0x000b00000001231c-126.dat family_neshta behavioral1/files/0x000100000000f83f-128.dat family_neshta behavioral1/files/0x000100000000f83f-129.dat family_neshta behavioral1/files/0x000100000000f840-130.dat family_neshta behavioral1/files/0x00080000000126c8-132.dat family_neshta behavioral1/files/0x000b00000001231c-137.dat family_neshta behavioral1/files/0x000100000000f884-135.dat family_neshta behavioral1/files/0x000b00000001231c-138.dat family_neshta behavioral1/files/0x000b00000001231c-140.dat family_neshta behavioral1/files/0x00010000000103b2-144.dat family_neshta behavioral1/files/0x0001000000010ba1-143.dat family_neshta behavioral1/files/0x00010000000114d3-142.dat family_neshta behavioral1/files/0x000100000000f884-141.dat family_neshta behavioral1/files/0x00080000000126c8-147.dat family_neshta behavioral1/files/0x000100000001180a-149.dat family_neshta -
Detects IceXLoader v3.0 25 IoCs
resource yara_rule behavioral1/files/0x000b00000001231c-55.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-56.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-58.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-60.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-70.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-72.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-69.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-79.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-82.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-80.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-90.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-89.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-92.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-100.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-99.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-102.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-109.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-110.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-112.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-123.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-124.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-126.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-137.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-138.dat family_icexloader_v3 behavioral1/files/0x000b00000001231c-140.dat family_icexloader_v3 -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
icexloader
IceXLoader is a downloader used to deliver other malware families.
-
Executes dropped EXE 64 IoCs
pid Process 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1236 svchost.com 584 E5FEB5~1.EXE 1572 svchost.com 1576 E5FEB5~1.EXE 1580 svchost.com 1512 E5FEB5~1.EXE 696 svchost.com 1492 E5FEB5~1.EXE 1624 svchost.com 1976 E5FEB5~1.EXE 1956 svchost.com 1636 E5FEB5~1.EXE 1484 svchost.com 1848 E5FEB5~1.EXE 1044 svchost.com 1092 E5FEB5~1.EXE 1168 svchost.com 432 E5FEB5~1.EXE 1236 svchost.com 1716 E5FEB5~1.EXE 520 svchost.com 1152 E5FEB5~1.EXE 1400 svchost.com 1288 E5FEB5~1.EXE 1544 svchost.com 1628 E5FEB5~1.EXE 1796 svchost.com 620 E5FEB5~1.EXE 928 svchost.com 1980 E5FEB5~1.EXE 1972 svchost.com 1892 svchost.com 1960 svchost.com 860 E5FEB5~1.EXE 1372 svchost.com 1672 svchost.com 1396 svchost.com 1704 E5FEB5~1.EXE 2008 svchost.com 1676 E5FEB5~1.EXE 1148 svchost.com 1764 E5FEB5~1.EXE 1092 svchost.com 1108 E5FEB5~1.EXE 1644 E5FEB5~1.EXE 1880 E5FEB5~1.EXE 1572 svchost.com 1088 E5FEB5~1.EXE 1152 svchost.com 1580 E5FEB5~1.EXE 1604 svchost.com 1260 E5FEB5~1.EXE 1128 svchost.com 820 E5FEB5~1.EXE 1568 svchost.com 2044 E5FEB5~1.EXE 1984 svchost.com 1624 E5FEB5~1.EXE 1892 svchost.com 1656 E5FEB5~1.EXE 1348 svchost.com 1384 E5FEB5~1.EXE 1672 svchost.com -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ICE X.exe E5FEB5~1.EXE -
Loads dropped DLL 64 IoCs
pid Process 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1236 svchost.com 1236 svchost.com 1572 svchost.com 1572 svchost.com 1580 svchost.com 1580 svchost.com 696 svchost.com 696 svchost.com 1624 svchost.com 1624 svchost.com 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1956 svchost.com 1956 svchost.com 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1484 svchost.com 1484 svchost.com 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1044 svchost.com 1044 svchost.com 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1168 svchost.com 1168 svchost.com 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1236 svchost.com 1236 svchost.com 520 svchost.com 520 svchost.com 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1400 svchost.com 1400 svchost.com 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1544 svchost.com 1544 svchost.com 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1796 svchost.com 1796 svchost.com 928 svchost.com 928 svchost.com 1972 svchost.com 1972 svchost.com 1960 svchost.com 1960 svchost.com 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1372 svchost.com 1372 svchost.com 1396 svchost.com 1396 svchost.com 2008 svchost.com 2008 svchost.com 1148 svchost.com 1148 svchost.com 1092 svchost.com 1092 svchost.com 1644 E5FEB5~1.EXE 1644 E5FEB5~1.EXE 1572 svchost.com 1572 svchost.com 1152 svchost.com 1152 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run E5FEB5~1.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ICE X = "\"C:\\Users\\Admin\\AppData\\Roaming\\ICE X.exe\"" E5FEB5~1.EXE Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run E5FEB5~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ICE X = "\"C:\\Users\\Admin\\AppData\\Roaming\\ICE X.exe\"" E5FEB5~1.EXE -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 956 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 956 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1316 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 27 PID 1768 wrote to memory of 1316 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 27 PID 1768 wrote to memory of 1316 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 27 PID 1768 wrote to memory of 1316 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 27 PID 1316 wrote to memory of 1236 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 28 PID 1316 wrote to memory of 1236 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 28 PID 1316 wrote to memory of 1236 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 28 PID 1316 wrote to memory of 1236 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 28 PID 1236 wrote to memory of 584 1236 svchost.com 29 PID 1236 wrote to memory of 584 1236 svchost.com 29 PID 1236 wrote to memory of 584 1236 svchost.com 29 PID 1236 wrote to memory of 584 1236 svchost.com 29 PID 584 wrote to memory of 1572 584 E5FEB5~1.EXE 30 PID 584 wrote to memory of 1572 584 E5FEB5~1.EXE 30 PID 584 wrote to memory of 1572 584 E5FEB5~1.EXE 30 PID 584 wrote to memory of 1572 584 E5FEB5~1.EXE 30 PID 1572 wrote to memory of 1576 1572 svchost.com 31 PID 1572 wrote to memory of 1576 1572 svchost.com 31 PID 1572 wrote to memory of 1576 1572 svchost.com 31 PID 1572 wrote to memory of 1576 1572 svchost.com 31 PID 1576 wrote to memory of 1580 1576 E5FEB5~1.EXE 32 PID 1576 wrote to memory of 1580 1576 E5FEB5~1.EXE 32 PID 1576 wrote to memory of 1580 1576 E5FEB5~1.EXE 32 PID 1576 wrote to memory of 1580 1576 E5FEB5~1.EXE 32 PID 1580 wrote to memory of 1512 1580 svchost.com 33 PID 1580 wrote to memory of 1512 1580 svchost.com 33 PID 1580 wrote to memory of 1512 1580 svchost.com 33 PID 1580 wrote to memory of 1512 1580 svchost.com 33 PID 1512 wrote to memory of 696 1512 E5FEB5~1.EXE 34 PID 1512 wrote to memory of 696 1512 E5FEB5~1.EXE 34 PID 1512 wrote to memory of 696 1512 E5FEB5~1.EXE 34 PID 1512 wrote to memory of 696 1512 E5FEB5~1.EXE 34 PID 696 wrote to memory of 1492 696 svchost.com 35 PID 696 wrote to memory of 1492 696 svchost.com 35 PID 696 wrote to memory of 1492 696 svchost.com 35 PID 696 wrote to memory of 1492 696 svchost.com 35 PID 1492 wrote to memory of 1624 1492 E5FEB5~1.EXE 36 PID 1492 wrote to memory of 1624 1492 E5FEB5~1.EXE 36 PID 1492 wrote to memory of 1624 1492 E5FEB5~1.EXE 36 PID 1492 wrote to memory of 1624 1492 E5FEB5~1.EXE 36 PID 1624 wrote to memory of 1976 1624 svchost.com 37 PID 1624 wrote to memory of 1976 1624 svchost.com 37 PID 1624 wrote to memory of 1976 1624 svchost.com 37 PID 1624 wrote to memory of 1976 1624 svchost.com 37 PID 1976 wrote to memory of 1956 1976 E5FEB5~1.EXE 38 PID 1976 wrote to memory of 1956 1976 E5FEB5~1.EXE 38 PID 1976 wrote to memory of 1956 1976 E5FEB5~1.EXE 38 PID 1976 wrote to memory of 1956 1976 E5FEB5~1.EXE 38 PID 1956 wrote to memory of 1636 1956 svchost.com 39 PID 1956 wrote to memory of 1636 1956 svchost.com 39 PID 1956 wrote to memory of 1636 1956 svchost.com 39 PID 1956 wrote to memory of 1636 1956 svchost.com 39 PID 1636 wrote to memory of 1484 1636 E5FEB5~1.EXE 40 PID 1636 wrote to memory of 1484 1636 E5FEB5~1.EXE 40 PID 1636 wrote to memory of 1484 1636 E5FEB5~1.EXE 40 PID 1636 wrote to memory of 1484 1636 E5FEB5~1.EXE 40 PID 1484 wrote to memory of 1848 1484 svchost.com 41 PID 1484 wrote to memory of 1848 1484 svchost.com 41 PID 1484 wrote to memory of 1848 1484 svchost.com 41 PID 1484 wrote to memory of 1848 1484 svchost.com 41 PID 1848 wrote to memory of 1044 1848 E5FEB5~1.EXE 42 PID 1848 wrote to memory of 1044 1848 E5FEB5~1.EXE 42 PID 1848 wrote to memory of 1044 1848 E5FEB5~1.EXE 42 PID 1848 wrote to memory of 1044 1848 E5FEB5~1.EXE 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe"C:\Users\Admin\AppData\Local\Temp\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE18⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE20⤵
- Executes dropped EXE
PID:432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE22⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE26⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE28⤵
- Executes dropped EXE
PID:1628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE30⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE32⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE34⤵PID:1892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE36⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE38⤵PID:1672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE40⤵
- Executes dropped EXE
PID:1704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"41⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE42⤵
- Executes dropped EXE
PID:1676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE44⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE46⤵
- Executes dropped EXE
PID:1108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"47⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE48⤵
- Executes dropped EXE
PID:1880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"49⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE50⤵
- Executes dropped EXE
PID:1088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE52⤵PID:1580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"53⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE54⤵PID:1260
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"55⤵
- Executes dropped EXE
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"57⤵
- Executes dropped EXE
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE58⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"59⤵
- Executes dropped EXE
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE60⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE62⤵PID:1656
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE64⤵
- Executes dropped EXE
PID:1384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"65⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE66⤵PID:1832
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"67⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE68⤵PID:2036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"69⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE70⤵PID:1296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"71⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE72⤵PID:1044
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"73⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE74⤵
- Drops file in Windows directory
PID:572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"75⤵
- Drops file in Windows directory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE76⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"77⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE78⤵
- Drops file in Windows directory
PID:520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"79⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE80⤵PID:1436
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"81⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE82⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"83⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE84⤵
- Executes dropped EXE
PID:1260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"85⤵
- Drops file in Windows directory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE86⤵PID:1512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"87⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE88⤵PID:1492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"89⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE90⤵PID:2032
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"91⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE92⤵PID:1800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"93⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE94⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"95⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE96⤵PID:768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"97⤵
- Drops file in Windows directory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE98⤵
- Drops file in Windows directory
PID:1308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"99⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE100⤵PID:1272
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"101⤵
- Drops file in Windows directory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE102⤵PID:740
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"103⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE104⤵
- Drops file in Windows directory
PID:1764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"105⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE106⤵PID:1236
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"107⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE108⤵PID:1640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"109⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE110⤵
- Drops file in Windows directory
PID:976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"111⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE112⤵PID:1264
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"113⤵
- Drops file in Windows directory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE114⤵PID:1164
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"115⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE116⤵PID:620
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"117⤵
- Drops file in Windows directory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE118⤵PID:1512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"119⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE120⤵PID:600
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"121⤵
- Drops file in Windows directory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE122⤵PID:880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-