Analysis
-
max time kernel
80s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
10-11-2022 01:06
Behavioral task
behavioral1
Sample
e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe
Resource
win10v2004-20220812-en
General
-
Target
e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe
-
Size
429KB
-
MD5
b88b8e449bb192a4e02dd49eb86d63d7
-
SHA1
143da397c9b972247147da79b11ae72b4dae07e8
-
SHA256
e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5
-
SHA512
ce4b54ab4266118e49153ac500cc0da92e5ca8fe32f25c7e91dbdd90da87f0ada32a020a42bc36ac98f64b6be3123d86e70c1c36fd888ed58c4f8fd184b4cbb1
-
SSDEEP
6144:k9rI7T8AzZV2MYORbAV9bQdnXgfyVQhAyPlb/F+bsn9:LIkEMtiQdwfyVQhAyPlb/wb
Malware Config
Signatures
-
Detect Neshta payload 49 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE family_neshta \PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE family_neshta C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE family_neshta \PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE family_neshta -
Detects IceXLoader v3.0 25 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 \Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe family_icexloader_v3 -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
icexloader
IceXLoader is a downloader used to deliver other malware families.
-
Executes dropped EXE 64 IoCs
Processes:
e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exesvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comsvchost.comsvchost.comE5FEB5~1.EXEsvchost.comsvchost.comsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEE5FEB5~1.EXEE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEpid process 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1236 svchost.com 584 E5FEB5~1.EXE 1572 svchost.com 1576 E5FEB5~1.EXE 1580 svchost.com 1512 E5FEB5~1.EXE 696 svchost.com 1492 E5FEB5~1.EXE 1624 svchost.com 1976 E5FEB5~1.EXE 1956 svchost.com 1636 E5FEB5~1.EXE 1484 svchost.com 1848 E5FEB5~1.EXE 1044 svchost.com 1092 E5FEB5~1.EXE 1168 svchost.com 432 E5FEB5~1.EXE 1236 svchost.com 1716 E5FEB5~1.EXE 520 svchost.com 1152 E5FEB5~1.EXE 1400 svchost.com 1288 E5FEB5~1.EXE 1544 svchost.com 1628 E5FEB5~1.EXE 1796 svchost.com 620 E5FEB5~1.EXE 928 svchost.com 1980 E5FEB5~1.EXE 1972 svchost.com 1892 svchost.com 1960 svchost.com 860 E5FEB5~1.EXE 1372 svchost.com 1672 svchost.com 1396 svchost.com 1704 E5FEB5~1.EXE 2008 svchost.com 1676 E5FEB5~1.EXE 1148 svchost.com 1764 E5FEB5~1.EXE 1092 svchost.com 1108 E5FEB5~1.EXE 1644 E5FEB5~1.EXE 1880 E5FEB5~1.EXE 1572 svchost.com 1088 E5FEB5~1.EXE 1152 svchost.com 1580 E5FEB5~1.EXE 1604 svchost.com 1260 E5FEB5~1.EXE 1128 svchost.com 820 E5FEB5~1.EXE 1568 svchost.com 2044 E5FEB5~1.EXE 1984 svchost.com 1624 E5FEB5~1.EXE 1892 svchost.com 1656 E5FEB5~1.EXE 1348 svchost.com 1384 E5FEB5~1.EXE 1672 svchost.com -
Drops startup file 1 IoCs
Processes:
E5FEB5~1.EXEdescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ICE X.exe E5FEB5~1.EXE -
Loads dropped DLL 64 IoCs
Processes:
e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.come5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comE5FEB5~1.EXEsvchost.comsvchost.compid process 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1236 svchost.com 1236 svchost.com 1572 svchost.com 1572 svchost.com 1580 svchost.com 1580 svchost.com 696 svchost.com 696 svchost.com 1624 svchost.com 1624 svchost.com 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1956 svchost.com 1956 svchost.com 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1484 svchost.com 1484 svchost.com 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1044 svchost.com 1044 svchost.com 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1168 svchost.com 1168 svchost.com 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1236 svchost.com 1236 svchost.com 520 svchost.com 520 svchost.com 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1400 svchost.com 1400 svchost.com 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1544 svchost.com 1544 svchost.com 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1796 svchost.com 1796 svchost.com 928 svchost.com 928 svchost.com 1972 svchost.com 1972 svchost.com 1960 svchost.com 1960 svchost.com 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe 1372 svchost.com 1372 svchost.com 1396 svchost.com 1396 svchost.com 2008 svchost.com 2008 svchost.com 1148 svchost.com 1148 svchost.com 1092 svchost.com 1092 svchost.com 1644 E5FEB5~1.EXE 1644 E5FEB5~1.EXE 1572 svchost.com 1572 svchost.com 1152 svchost.com 1152 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
E5FEB5~1.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run E5FEB5~1.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ICE X = "\"C:\\Users\\Admin\\AppData\\Roaming\\ICE X.exe\"" E5FEB5~1.EXE Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run E5FEB5~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ICE X = "\"C:\\Users\\Admin\\AppData\\Roaming\\ICE X.exe\"" E5FEB5~1.EXE -
Drops file in Program Files directory 64 IoCs
Processes:
e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exee5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exedescription ioc process File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe -
Drops file in Windows directory 64 IoCs
Processes:
E5FEB5~1.EXEsvchost.comsvchost.comE5FEB5~1.EXEsvchost.comsvchost.comE5FEB5~1.EXEE5FEB5~1.EXEE5FEB5~1.EXEE5FEB5~1.EXEsvchost.comsvchost.comsvchost.comE5FEB5~1.EXEE5FEB5~1.EXEE5FEB5~1.EXEE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEE5FEB5~1.EXEE5FEB5~1.EXEsvchost.comsvchost.comsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comsvchost.comsvchost.comE5FEB5~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comE5FEB5~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEE5FEB5~1.EXEE5FEB5~1.EXEsvchost.comsvchost.comsvchost.comE5FEB5~1.EXEsvchost.comsvchost.comsvchost.comE5FEB5~1.EXEsvchost.comdescription ioc process File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys E5FEB5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 956 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 956 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exee5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exesvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEsvchost.comE5FEB5~1.EXEdescription pid process target process PID 1768 wrote to memory of 1316 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe PID 1768 wrote to memory of 1316 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe PID 1768 wrote to memory of 1316 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe PID 1768 wrote to memory of 1316 1768 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe PID 1316 wrote to memory of 1236 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe svchost.com PID 1316 wrote to memory of 1236 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe svchost.com PID 1316 wrote to memory of 1236 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe svchost.com PID 1316 wrote to memory of 1236 1316 e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe svchost.com PID 1236 wrote to memory of 584 1236 svchost.com E5FEB5~1.EXE PID 1236 wrote to memory of 584 1236 svchost.com E5FEB5~1.EXE PID 1236 wrote to memory of 584 1236 svchost.com E5FEB5~1.EXE PID 1236 wrote to memory of 584 1236 svchost.com E5FEB5~1.EXE PID 584 wrote to memory of 1572 584 E5FEB5~1.EXE svchost.com PID 584 wrote to memory of 1572 584 E5FEB5~1.EXE svchost.com PID 584 wrote to memory of 1572 584 E5FEB5~1.EXE svchost.com PID 584 wrote to memory of 1572 584 E5FEB5~1.EXE svchost.com PID 1572 wrote to memory of 1576 1572 svchost.com E5FEB5~1.EXE PID 1572 wrote to memory of 1576 1572 svchost.com E5FEB5~1.EXE PID 1572 wrote to memory of 1576 1572 svchost.com E5FEB5~1.EXE PID 1572 wrote to memory of 1576 1572 svchost.com E5FEB5~1.EXE PID 1576 wrote to memory of 1580 1576 E5FEB5~1.EXE svchost.com PID 1576 wrote to memory of 1580 1576 E5FEB5~1.EXE svchost.com PID 1576 wrote to memory of 1580 1576 E5FEB5~1.EXE svchost.com PID 1576 wrote to memory of 1580 1576 E5FEB5~1.EXE svchost.com PID 1580 wrote to memory of 1512 1580 svchost.com E5FEB5~1.EXE PID 1580 wrote to memory of 1512 1580 svchost.com E5FEB5~1.EXE PID 1580 wrote to memory of 1512 1580 svchost.com E5FEB5~1.EXE PID 1580 wrote to memory of 1512 1580 svchost.com E5FEB5~1.EXE PID 1512 wrote to memory of 696 1512 E5FEB5~1.EXE svchost.com PID 1512 wrote to memory of 696 1512 E5FEB5~1.EXE svchost.com PID 1512 wrote to memory of 696 1512 E5FEB5~1.EXE svchost.com PID 1512 wrote to memory of 696 1512 E5FEB5~1.EXE svchost.com PID 696 wrote to memory of 1492 696 svchost.com E5FEB5~1.EXE PID 696 wrote to memory of 1492 696 svchost.com E5FEB5~1.EXE PID 696 wrote to memory of 1492 696 svchost.com E5FEB5~1.EXE PID 696 wrote to memory of 1492 696 svchost.com E5FEB5~1.EXE PID 1492 wrote to memory of 1624 1492 E5FEB5~1.EXE svchost.com PID 1492 wrote to memory of 1624 1492 E5FEB5~1.EXE svchost.com PID 1492 wrote to memory of 1624 1492 E5FEB5~1.EXE svchost.com PID 1492 wrote to memory of 1624 1492 E5FEB5~1.EXE svchost.com PID 1624 wrote to memory of 1976 1624 svchost.com E5FEB5~1.EXE PID 1624 wrote to memory of 1976 1624 svchost.com E5FEB5~1.EXE PID 1624 wrote to memory of 1976 1624 svchost.com E5FEB5~1.EXE PID 1624 wrote to memory of 1976 1624 svchost.com E5FEB5~1.EXE PID 1976 wrote to memory of 1956 1976 E5FEB5~1.EXE svchost.com PID 1976 wrote to memory of 1956 1976 E5FEB5~1.EXE svchost.com PID 1976 wrote to memory of 1956 1976 E5FEB5~1.EXE svchost.com PID 1976 wrote to memory of 1956 1976 E5FEB5~1.EXE svchost.com PID 1956 wrote to memory of 1636 1956 svchost.com E5FEB5~1.EXE PID 1956 wrote to memory of 1636 1956 svchost.com E5FEB5~1.EXE PID 1956 wrote to memory of 1636 1956 svchost.com E5FEB5~1.EXE PID 1956 wrote to memory of 1636 1956 svchost.com E5FEB5~1.EXE PID 1636 wrote to memory of 1484 1636 E5FEB5~1.EXE svchost.com PID 1636 wrote to memory of 1484 1636 E5FEB5~1.EXE svchost.com PID 1636 wrote to memory of 1484 1636 E5FEB5~1.EXE svchost.com PID 1636 wrote to memory of 1484 1636 E5FEB5~1.EXE svchost.com PID 1484 wrote to memory of 1848 1484 svchost.com E5FEB5~1.EXE PID 1484 wrote to memory of 1848 1484 svchost.com E5FEB5~1.EXE PID 1484 wrote to memory of 1848 1484 svchost.com E5FEB5~1.EXE PID 1484 wrote to memory of 1848 1484 svchost.com E5FEB5~1.EXE PID 1848 wrote to memory of 1044 1848 E5FEB5~1.EXE svchost.com PID 1848 wrote to memory of 1044 1848 E5FEB5~1.EXE svchost.com PID 1848 wrote to memory of 1044 1848 E5FEB5~1.EXE svchost.com PID 1848 wrote to memory of 1044 1848 E5FEB5~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe"C:\Users\Admin\AppData\Local\Temp\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE18⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE20⤵
- Executes dropped EXE
PID:432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE22⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE26⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE28⤵
- Executes dropped EXE
PID:1628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE30⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE32⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE34⤵PID:1892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE36⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE38⤵PID:1672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE40⤵
- Executes dropped EXE
PID:1704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"41⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE42⤵
- Executes dropped EXE
PID:1676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE44⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE46⤵
- Executes dropped EXE
PID:1108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"47⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE48⤵
- Executes dropped EXE
PID:1880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"49⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE50⤵
- Executes dropped EXE
PID:1088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE52⤵PID:1580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"53⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE54⤵PID:1260
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"55⤵
- Executes dropped EXE
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"57⤵
- Executes dropped EXE
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE58⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"59⤵
- Executes dropped EXE
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE60⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE62⤵PID:1656
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE64⤵
- Executes dropped EXE
PID:1384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"65⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE66⤵PID:1832
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"67⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE68⤵PID:2036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"69⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE70⤵PID:1296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"71⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE72⤵PID:1044
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"73⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE74⤵
- Drops file in Windows directory
PID:572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"75⤵
- Drops file in Windows directory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE76⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"77⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE78⤵
- Drops file in Windows directory
PID:520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"79⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE80⤵PID:1436
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"81⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE82⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"83⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE84⤵
- Executes dropped EXE
PID:1260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"85⤵
- Drops file in Windows directory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE86⤵PID:1512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"87⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE88⤵PID:1492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"89⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE90⤵PID:2032
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"91⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE92⤵PID:1800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"93⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE94⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"95⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE96⤵PID:768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"97⤵
- Drops file in Windows directory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE98⤵
- Drops file in Windows directory
PID:1308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"99⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE100⤵PID:1272
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"101⤵
- Drops file in Windows directory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE102⤵PID:740
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"103⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE104⤵
- Drops file in Windows directory
PID:1764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"105⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE106⤵PID:1236
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"107⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE108⤵PID:1640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"109⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE110⤵
- Drops file in Windows directory
PID:976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"111⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE112⤵PID:1264
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"113⤵
- Drops file in Windows directory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE114⤵PID:1164
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"115⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE116⤵PID:620
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"117⤵
- Drops file in Windows directory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE118⤵PID:1512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"119⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE120⤵PID:600
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE"121⤵
- Drops file in Windows directory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\E5FEB5~1.EXE122⤵PID:880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-