Analysis
-
max time kernel
184s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
18-11-2022 22:27
Behavioral task
behavioral1
Sample
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe
Resource
win10v2004-20220812-en
General
-
Target
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe
-
Size
896KB
-
MD5
4c2d61a636fb7726ceb1598b180a51a0
-
SHA1
463acc26ef1cc53b57b9b38e438d30c153af60a1
-
SHA256
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89
-
SHA512
ce4e918e46e64e86816dbea480c142e33315ea47ece9a18c4aad5774917d7f60dfe3ac9098e161595f68ba1ce3071fe107c4c03f928590c9351420299565aeec
-
SSDEEP
12288:8Smgt5H4kInv7kvNmvlJMoUEc4w1WilWAgJ:8S3t59YIvNmvlJLtKW4WV
Malware Config
Signatures
-
Detect Neshta payload 46 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exesvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.compid process 1492 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe 1120 svchost.com 680 52D5C3~1.EXE 1584 svchost.com 1660 52D5C3~1.EXE 1704 svchost.com 808 52D5C3~1.EXE 536 svchost.com 1436 52D5C3~1.EXE 1328 svchost.com 552 52D5C3~1.EXE 1256 svchost.com 616 52D5C3~1.EXE 692 svchost.com 1260 52D5C3~1.EXE 272 svchost.com 1728 52D5C3~1.EXE 1352 svchost.com 876 52D5C3~1.EXE 2016 svchost.com 1192 52D5C3~1.EXE 1572 svchost.com 296 52D5C3~1.EXE 316 svchost.com 1704 52D5C3~1.EXE 2028 svchost.com 2024 52D5C3~1.EXE 1436 svchost.com 1840 52D5C3~1.EXE 524 svchost.com 1956 52D5C3~1.EXE 1544 svchost.com 1176 52D5C3~1.EXE 1280 svchost.com 896 52D5C3~1.EXE 1016 svchost.com 800 52D5C3~1.EXE 1608 svchost.com 1320 52D5C3~1.EXE 780 svchost.com 1128 52D5C3~1.EXE 1088 svchost.com 936 52D5C3~1.EXE 2004 svchost.com 336 52D5C3~1.EXE 1660 svchost.com 1656 52D5C3~1.EXE 1836 svchost.com 1768 52D5C3~1.EXE 1156 svchost.com 940 52D5C3~1.EXE 1360 svchost.com 844 52D5C3~1.EXE 1840 svchost.com 1516 52D5C3~1.EXE 1356 svchost.com 1456 52D5C3~1.EXE 1312 svchost.com 908 52D5C3~1.EXE 896 svchost.com 1348 52D5C3~1.EXE 1636 svchost.com 1940 52D5C3~1.EXE 644 svchost.com -
Loads dropped DLL 64 IoCs
Processes:
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.compid process 1596 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe 1596 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe 1120 svchost.com 1120 svchost.com 1584 svchost.com 1584 svchost.com 1704 svchost.com 1704 svchost.com 536 svchost.com 536 svchost.com 1328 svchost.com 1328 svchost.com 1256 svchost.com 1256 svchost.com 692 svchost.com 692 svchost.com 272 svchost.com 272 svchost.com 1352 svchost.com 1352 svchost.com 2016 svchost.com 2016 svchost.com 1572 svchost.com 1572 svchost.com 316 svchost.com 316 svchost.com 2028 svchost.com 2028 svchost.com 1436 svchost.com 1436 svchost.com 524 svchost.com 524 svchost.com 1544 svchost.com 1544 svchost.com 1280 svchost.com 1280 svchost.com 1016 svchost.com 1016 svchost.com 1608 svchost.com 1608 svchost.com 780 svchost.com 780 svchost.com 1088 svchost.com 1088 svchost.com 2004 svchost.com 2004 svchost.com 1660 svchost.com 1660 svchost.com 1836 svchost.com 1836 svchost.com 1156 svchost.com 1156 svchost.com 1360 svchost.com 1360 svchost.com 1840 svchost.com 1840 svchost.com 1356 svchost.com 1356 svchost.com 1312 svchost.com 1312 svchost.com 896 svchost.com 896 svchost.com 1636 svchost.com 1636 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe -
Drops file in Windows directory 64 IoCs
Processes:
52D5C3~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com52D5C3~1.EXEsvchost.comsvchost.comsvchost.com52D5C3~1.EXEsvchost.comsvchost.com52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXEsvchost.comsvchost.comsvchost.com52D5C3~1.EXE52D5C3~1.EXEsvchost.com52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXEsvchost.comsvchost.com52D5C3~1.EXEsvchost.comsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXE52D5C3~1.EXEdescription ioc process File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exesvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEdescription pid process target process PID 1596 wrote to memory of 1492 1596 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe PID 1596 wrote to memory of 1492 1596 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe PID 1596 wrote to memory of 1492 1596 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe PID 1596 wrote to memory of 1492 1596 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe PID 1492 wrote to memory of 1120 1492 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe svchost.com PID 1492 wrote to memory of 1120 1492 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe svchost.com PID 1492 wrote to memory of 1120 1492 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe svchost.com PID 1492 wrote to memory of 1120 1492 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe svchost.com PID 1120 wrote to memory of 680 1120 svchost.com 52D5C3~1.EXE PID 1120 wrote to memory of 680 1120 svchost.com 52D5C3~1.EXE PID 1120 wrote to memory of 680 1120 svchost.com 52D5C3~1.EXE PID 1120 wrote to memory of 680 1120 svchost.com 52D5C3~1.EXE PID 680 wrote to memory of 1584 680 52D5C3~1.EXE svchost.com PID 680 wrote to memory of 1584 680 52D5C3~1.EXE svchost.com PID 680 wrote to memory of 1584 680 52D5C3~1.EXE svchost.com PID 680 wrote to memory of 1584 680 52D5C3~1.EXE svchost.com PID 1584 wrote to memory of 1660 1584 svchost.com 52D5C3~1.EXE PID 1584 wrote to memory of 1660 1584 svchost.com 52D5C3~1.EXE PID 1584 wrote to memory of 1660 1584 svchost.com 52D5C3~1.EXE PID 1584 wrote to memory of 1660 1584 svchost.com 52D5C3~1.EXE PID 1660 wrote to memory of 1704 1660 52D5C3~1.EXE svchost.com PID 1660 wrote to memory of 1704 1660 52D5C3~1.EXE svchost.com PID 1660 wrote to memory of 1704 1660 52D5C3~1.EXE svchost.com PID 1660 wrote to memory of 1704 1660 52D5C3~1.EXE svchost.com PID 1704 wrote to memory of 808 1704 svchost.com 52D5C3~1.EXE PID 1704 wrote to memory of 808 1704 svchost.com 52D5C3~1.EXE PID 1704 wrote to memory of 808 1704 svchost.com 52D5C3~1.EXE PID 1704 wrote to memory of 808 1704 svchost.com 52D5C3~1.EXE PID 808 wrote to memory of 536 808 52D5C3~1.EXE svchost.com PID 808 wrote to memory of 536 808 52D5C3~1.EXE svchost.com PID 808 wrote to memory of 536 808 52D5C3~1.EXE svchost.com PID 808 wrote to memory of 536 808 52D5C3~1.EXE svchost.com PID 536 wrote to memory of 1436 536 svchost.com 52D5C3~1.EXE PID 536 wrote to memory of 1436 536 svchost.com 52D5C3~1.EXE PID 536 wrote to memory of 1436 536 svchost.com 52D5C3~1.EXE PID 536 wrote to memory of 1436 536 svchost.com 52D5C3~1.EXE PID 1436 wrote to memory of 1328 1436 52D5C3~1.EXE svchost.com PID 1436 wrote to memory of 1328 1436 52D5C3~1.EXE svchost.com PID 1436 wrote to memory of 1328 1436 52D5C3~1.EXE svchost.com PID 1436 wrote to memory of 1328 1436 52D5C3~1.EXE svchost.com PID 1328 wrote to memory of 552 1328 svchost.com 52D5C3~1.EXE PID 1328 wrote to memory of 552 1328 svchost.com 52D5C3~1.EXE PID 1328 wrote to memory of 552 1328 svchost.com 52D5C3~1.EXE PID 1328 wrote to memory of 552 1328 svchost.com 52D5C3~1.EXE PID 552 wrote to memory of 1256 552 52D5C3~1.EXE svchost.com PID 552 wrote to memory of 1256 552 52D5C3~1.EXE svchost.com PID 552 wrote to memory of 1256 552 52D5C3~1.EXE svchost.com PID 552 wrote to memory of 1256 552 52D5C3~1.EXE svchost.com PID 1256 wrote to memory of 616 1256 svchost.com 52D5C3~1.EXE PID 1256 wrote to memory of 616 1256 svchost.com 52D5C3~1.EXE PID 1256 wrote to memory of 616 1256 svchost.com 52D5C3~1.EXE PID 1256 wrote to memory of 616 1256 svchost.com 52D5C3~1.EXE PID 616 wrote to memory of 692 616 52D5C3~1.EXE svchost.com PID 616 wrote to memory of 692 616 52D5C3~1.EXE svchost.com PID 616 wrote to memory of 692 616 52D5C3~1.EXE svchost.com PID 616 wrote to memory of 692 616 52D5C3~1.EXE svchost.com PID 692 wrote to memory of 1260 692 svchost.com 52D5C3~1.EXE PID 692 wrote to memory of 1260 692 svchost.com 52D5C3~1.EXE PID 692 wrote to memory of 1260 692 svchost.com 52D5C3~1.EXE PID 692 wrote to memory of 1260 692 svchost.com 52D5C3~1.EXE PID 1260 wrote to memory of 272 1260 52D5C3~1.EXE svchost.com PID 1260 wrote to memory of 272 1260 52D5C3~1.EXE svchost.com PID 1260 wrote to memory of 272 1260 52D5C3~1.EXE svchost.com PID 1260 wrote to memory of 272 1260 52D5C3~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe"C:\Users\Admin\AppData\Local\Temp\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE18⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE20⤵
- Executes dropped EXE
PID:876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE22⤵
- Executes dropped EXE
PID:1192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE24⤵
- Executes dropped EXE
PID:296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE26⤵
- Executes dropped EXE
PID:1704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2028
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE1⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE3⤵
- Executes dropped EXE
PID:1840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE5⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE7⤵
- Executes dropped EXE
PID:1176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE9⤵
- Executes dropped EXE
PID:896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE11⤵
- Executes dropped EXE
PID:800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE13⤵
- Executes dropped EXE
PID:1320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE15⤵
- Executes dropped EXE
PID:1128 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE17⤵
- Executes dropped EXE
PID:936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE19⤵
- Executes dropped EXE
PID:336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE21⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE23⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE25⤵
- Executes dropped EXE
PID:940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE27⤵
- Executes dropped EXE
PID:844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE29⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE31⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE33⤵
- Executes dropped EXE
PID:908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE35⤵
- Executes dropped EXE
PID:1348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE37⤵
- Executes dropped EXE
PID:1940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"38⤵
- Executes dropped EXE
PID:644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE39⤵PID:588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"40⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE41⤵PID:780
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"42⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE43⤵PID:712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"44⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE45⤵PID:904
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"46⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE47⤵PID:1572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"48⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE49⤵PID:1656
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"50⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE51⤵PID:1768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"52⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE53⤵PID:1156
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"54⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE55⤵PID:1436
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"56⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE57⤵PID:1416
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"58⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE59⤵PID:1700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"60⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE61⤵PID:1372
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"62⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE63⤵PID:1312
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"64⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE65⤵PID:1900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"66⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE1⤵PID:1508
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"2⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE3⤵PID:1984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"4⤵
- Drops file in Windows directory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE5⤵PID:1368
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"6⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE7⤵PID:1088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"8⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE9⤵PID:1664
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"10⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE11⤵
- Drops file in Windows directory
PID:1888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"12⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE13⤵PID:1108
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"14⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE15⤵PID:1964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"16⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE17⤵PID:1992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"18⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE19⤵PID:1360
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"20⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE21⤵PID:1328
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"22⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE23⤵
- Drops file in Windows directory
PID:1544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"24⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE25⤵
- Drops file in Windows directory
PID:1904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"26⤵
- Drops file in Windows directory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE27⤵PID:1260
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"28⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE29⤵
- Drops file in Windows directory
PID:1720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"30⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE31⤵PID:1644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"32⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE33⤵PID:1908
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"34⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE35⤵PID:924
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"36⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE37⤵PID:1092
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"38⤵
- Drops file in Windows directory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE39⤵PID:2004
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"40⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE41⤵PID:1692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"42⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE43⤵PID:1888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"44⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE45⤵PID:1108
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"46⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE47⤵PID:1704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"48⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE49⤵PID:1992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"50⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE51⤵PID:1972
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"52⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE53⤵PID:1436
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"54⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE55⤵PID:1700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"56⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE57⤵PID:964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"58⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE59⤵PID:580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"60⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE61⤵PID:1900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"62⤵
- Drops file in Windows directory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE63⤵PID:1644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"64⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE65⤵PID:692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"66⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE67⤵PID:1984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"68⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE69⤵PID:1368
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"70⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE71⤵PID:768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"72⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE73⤵PID:904
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"74⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE75⤵PID:2016
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"76⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE77⤵PID:1616
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"78⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE79⤵
- Drops file in Windows directory
PID:1044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"80⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE81⤵PID:1988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"82⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE83⤵PID:1360
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"84⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE85⤵PID:1400
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"86⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE87⤵PID:1372
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"88⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE89⤵PID:1280
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"90⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE91⤵PID:700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"92⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE93⤵PID:324
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"94⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE95⤵PID:1788
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"96⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE97⤵PID:588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"98⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE99⤵PID:604
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"100⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE101⤵PID:1808
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"102⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE103⤵PID:1088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"104⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE105⤵PID:668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"106⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE107⤵PID:808
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"108⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE109⤵PID:1216
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"110⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE111⤵PID:1912
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"112⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE113⤵PID:1960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"114⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE115⤵PID:1800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"116⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE117⤵PID:1436
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"118⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE119⤵PID:1456
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"120⤵
- Drops file in Windows directory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE121⤵PID:1700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"122⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE123⤵PID:964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"124⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE125⤵PID:1100
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"126⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE127⤵PID:1940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"128⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE129⤵PID:1508
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"130⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE131⤵PID:1752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"132⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE133⤵PID:712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"134⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE135⤵PID:1832
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"136⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE137⤵PID:1660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"138⤵
- Drops file in Windows directory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE139⤵PID:316
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"140⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE141⤵PID:1216
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"142⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE143⤵PID:1768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"144⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE145⤵PID:1988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"146⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE147⤵PID:1328
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"148⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE149⤵PID:1956
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"150⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE151⤵PID:320
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"152⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE153⤵PID:1176
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"154⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE155⤵PID:1016
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"156⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE157⤵
- Drops file in Windows directory
PID:1560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"158⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE159⤵PID:396
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"160⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE161⤵PID:516
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"162⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE163⤵PID:692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"164⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE165⤵PID:768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"166⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE167⤵PID:668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"168⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE169⤵PID:1108
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"170⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE171⤵PID:1964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"172⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE173⤵
- Drops file in Windows directory
PID:112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"174⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE175⤵PID:1960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"176⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE177⤵PID:524
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"178⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE179⤵PID:1436
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"180⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE181⤵PID:1456
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"182⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE183⤵PID:1700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"184⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE185⤵PID:1348
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"186⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE187⤵PID:1644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"188⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE189⤵PID:1636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"190⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE191⤵PID:604
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"192⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE193⤵PID:1808
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"194⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE195⤵PID:1844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"196⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE197⤵PID:1192
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"198⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE199⤵PID:1660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"200⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE201⤵PID:1044
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"202⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE203⤵PID:536
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"204⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE205⤵PID:1684
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"206⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE207⤵PID:1400
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"208⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE209⤵PID:1516
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"210⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE211⤵PID:1568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"212⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE213⤵PID:1504
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"214⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE215⤵PID:1904
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"216⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE217⤵PID:872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"218⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE219⤵PID:1644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"220⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE221⤵PID:1584
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"222⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE223⤵PID:1908
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"224⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE225⤵PID:712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"226⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE227⤵PID:768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"228⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE229⤵PID:1192
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"230⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE231⤵PID:1660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"232⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE233⤵PID:1044
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"234⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE235⤵PID:536
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"236⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE237⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"238⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE239⤵PID:1400
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"240⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE241⤵PID:1516
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"242⤵PID:1356