Analysis
-
max time kernel
156s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2022 22:27
Behavioral task
behavioral1
Sample
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe
Resource
win10v2004-20220812-en
General
-
Target
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe
-
Size
896KB
-
MD5
4c2d61a636fb7726ceb1598b180a51a0
-
SHA1
463acc26ef1cc53b57b9b38e438d30c153af60a1
-
SHA256
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89
-
SHA512
ce4e918e46e64e86816dbea480c142e33315ea47ece9a18c4aad5774917d7f60dfe3ac9098e161595f68ba1ce3071fe107c4c03f928590c9351420299565aeec
-
SSDEEP
12288:8Smgt5H4kInv7kvNmvlJMoUEc4w1WilWAgJ:8S3t59YIvNmvlJLtKW4WV
Malware Config
Signatures
-
Detect Neshta payload 34 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exesvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.compid process 5004 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe 2080 svchost.com 644 52D5C3~1.EXE 1904 svchost.com 2112 52D5C3~1.EXE 2468 svchost.com 1984 52D5C3~1.EXE 264 svchost.com 4488 52D5C3~1.EXE 4952 svchost.com 4968 52D5C3~1.EXE 2188 svchost.com 3036 52D5C3~1.EXE 5104 svchost.com 4392 52D5C3~1.EXE 4724 svchost.com 3296 52D5C3~1.EXE 1132 svchost.com 1124 52D5C3~1.EXE 4652 svchost.com 4764 52D5C3~1.EXE 3572 svchost.com 3648 52D5C3~1.EXE 4616 svchost.com 4760 52D5C3~1.EXE 1476 svchost.com 784 52D5C3~1.EXE 2824 svchost.com 1784 52D5C3~1.EXE 4476 svchost.com 4396 52D5C3~1.EXE 3972 svchost.com 3148 52D5C3~1.EXE 3876 svchost.com 840 52D5C3~1.EXE 4108 svchost.com 2128 52D5C3~1.EXE 3144 svchost.com 3748 52D5C3~1.EXE 1948 svchost.com 4548 52D5C3~1.EXE 3712 svchost.com 4196 52D5C3~1.EXE 2624 svchost.com 2476 52D5C3~1.EXE 5080 svchost.com 1960 52D5C3~1.EXE 3508 svchost.com 2904 52D5C3~1.EXE 3352 svchost.com 2260 52D5C3~1.EXE 4588 svchost.com 2028 52D5C3~1.EXE 4580 svchost.com 3192 52D5C3~1.EXE 2100 svchost.com 316 52D5C3~1.EXE 216 svchost.com 3636 52D5C3~1.EXE 3388 svchost.com 4036 52D5C3~1.EXE 4776 svchost.com 2200 52D5C3~1.EXE 1800 svchost.com -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXEdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 52D5C3~1.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exedescription ioc process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\104012~1.47\MSEDGE~2.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\104012~1.47\PWAHEL~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\104012~1.47\ELEVAT~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\104012~1.47\IDENTI~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~4.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\104012~1.47\NOTIFI~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~3.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\104012~1.47\msedge.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\104012~1.47\MSEDGE~1.EXE 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.comsvchost.com52D5C3~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXE52D5C3~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXEsvchost.comsvchost.comsvchost.com52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXEsvchost.comsvchost.com52D5C3~1.EXEsvchost.comsvchost.com52D5C3~1.EXE52D5C3~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXEsvchost.comsvchost.com52D5C3~1.EXE52D5C3~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXEsvchost.com52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXEsvchost.comsvchost.comdescription ioc process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys 52D5C3~1.EXE File opened for modification C:\Windows\svchost.com 52D5C3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
Processes:
52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXE52D5C3~1.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 52D5C3~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exesvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEsvchost.com52D5C3~1.EXEdescription pid process target process PID 4064 wrote to memory of 5004 4064 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe PID 4064 wrote to memory of 5004 4064 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe PID 4064 wrote to memory of 5004 4064 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe PID 5004 wrote to memory of 2080 5004 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe svchost.com PID 5004 wrote to memory of 2080 5004 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe svchost.com PID 5004 wrote to memory of 2080 5004 52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe svchost.com PID 2080 wrote to memory of 644 2080 svchost.com 52D5C3~1.EXE PID 2080 wrote to memory of 644 2080 svchost.com 52D5C3~1.EXE PID 2080 wrote to memory of 644 2080 svchost.com 52D5C3~1.EXE PID 644 wrote to memory of 1904 644 52D5C3~1.EXE svchost.com PID 644 wrote to memory of 1904 644 52D5C3~1.EXE svchost.com PID 644 wrote to memory of 1904 644 52D5C3~1.EXE svchost.com PID 1904 wrote to memory of 2112 1904 svchost.com 52D5C3~1.EXE PID 1904 wrote to memory of 2112 1904 svchost.com 52D5C3~1.EXE PID 1904 wrote to memory of 2112 1904 svchost.com 52D5C3~1.EXE PID 2112 wrote to memory of 2468 2112 52D5C3~1.EXE svchost.com PID 2112 wrote to memory of 2468 2112 52D5C3~1.EXE svchost.com PID 2112 wrote to memory of 2468 2112 52D5C3~1.EXE svchost.com PID 2468 wrote to memory of 1984 2468 svchost.com 52D5C3~1.EXE PID 2468 wrote to memory of 1984 2468 svchost.com 52D5C3~1.EXE PID 2468 wrote to memory of 1984 2468 svchost.com 52D5C3~1.EXE PID 1984 wrote to memory of 264 1984 52D5C3~1.EXE svchost.com PID 1984 wrote to memory of 264 1984 52D5C3~1.EXE svchost.com PID 1984 wrote to memory of 264 1984 52D5C3~1.EXE svchost.com PID 264 wrote to memory of 4488 264 svchost.com 52D5C3~1.EXE PID 264 wrote to memory of 4488 264 svchost.com 52D5C3~1.EXE PID 264 wrote to memory of 4488 264 svchost.com 52D5C3~1.EXE PID 4488 wrote to memory of 4952 4488 52D5C3~1.EXE svchost.com PID 4488 wrote to memory of 4952 4488 52D5C3~1.EXE svchost.com PID 4488 wrote to memory of 4952 4488 52D5C3~1.EXE svchost.com PID 4952 wrote to memory of 4968 4952 svchost.com 52D5C3~1.EXE PID 4952 wrote to memory of 4968 4952 svchost.com 52D5C3~1.EXE PID 4952 wrote to memory of 4968 4952 svchost.com 52D5C3~1.EXE PID 4968 wrote to memory of 2188 4968 52D5C3~1.EXE svchost.com PID 4968 wrote to memory of 2188 4968 52D5C3~1.EXE svchost.com PID 4968 wrote to memory of 2188 4968 52D5C3~1.EXE svchost.com PID 2188 wrote to memory of 3036 2188 svchost.com 52D5C3~1.EXE PID 2188 wrote to memory of 3036 2188 svchost.com 52D5C3~1.EXE PID 2188 wrote to memory of 3036 2188 svchost.com 52D5C3~1.EXE PID 3036 wrote to memory of 5104 3036 52D5C3~1.EXE svchost.com PID 3036 wrote to memory of 5104 3036 52D5C3~1.EXE svchost.com PID 3036 wrote to memory of 5104 3036 52D5C3~1.EXE svchost.com PID 5104 wrote to memory of 4392 5104 svchost.com 52D5C3~1.EXE PID 5104 wrote to memory of 4392 5104 svchost.com 52D5C3~1.EXE PID 5104 wrote to memory of 4392 5104 svchost.com 52D5C3~1.EXE PID 4392 wrote to memory of 4724 4392 52D5C3~1.EXE svchost.com PID 4392 wrote to memory of 4724 4392 52D5C3~1.EXE svchost.com PID 4392 wrote to memory of 4724 4392 52D5C3~1.EXE svchost.com PID 4724 wrote to memory of 3296 4724 svchost.com 52D5C3~1.EXE PID 4724 wrote to memory of 3296 4724 svchost.com 52D5C3~1.EXE PID 4724 wrote to memory of 3296 4724 svchost.com 52D5C3~1.EXE PID 3296 wrote to memory of 1132 3296 52D5C3~1.EXE svchost.com PID 3296 wrote to memory of 1132 3296 52D5C3~1.EXE svchost.com PID 3296 wrote to memory of 1132 3296 52D5C3~1.EXE svchost.com PID 1132 wrote to memory of 1124 1132 svchost.com 52D5C3~1.EXE PID 1132 wrote to memory of 1124 1132 svchost.com 52D5C3~1.EXE PID 1132 wrote to memory of 1124 1132 svchost.com 52D5C3~1.EXE PID 1124 wrote to memory of 4652 1124 52D5C3~1.EXE svchost.com PID 1124 wrote to memory of 4652 1124 52D5C3~1.EXE svchost.com PID 1124 wrote to memory of 4652 1124 52D5C3~1.EXE svchost.com PID 4652 wrote to memory of 4764 4652 svchost.com 52D5C3~1.EXE PID 4652 wrote to memory of 4764 4652 svchost.com 52D5C3~1.EXE PID 4652 wrote to memory of 4764 4652 svchost.com 52D5C3~1.EXE PID 4764 wrote to memory of 3572 4764 52D5C3~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe"C:\Users\Admin\AppData\Local\Temp\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\52d5c35c4fbf0a7ef4b068865773cc5c0ce86d2f8485c76542b7a498e02c2f89.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"23⤵
- Executes dropped EXE
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE24⤵
- Executes dropped EXE
- Checks computer location settings
PID:3648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"25⤵
- Executes dropped EXE
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE26⤵
- Executes dropped EXE
PID:4760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"27⤵
- Executes dropped EXE
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE28⤵
- Executes dropped EXE
PID:784 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE30⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"31⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE32⤵
- Executes dropped EXE
PID:4396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"33⤵
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE34⤵
- Executes dropped EXE
PID:3148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"35⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE36⤵
- Executes dropped EXE
- Checks computer location settings
PID:840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"37⤵
- Executes dropped EXE
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE38⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
PID:2128 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"39⤵
- Executes dropped EXE
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE40⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"41⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE42⤵
- Executes dropped EXE
PID:4548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"43⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE44⤵
- Executes dropped EXE
PID:4196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"45⤵
- Executes dropped EXE
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE46⤵
- Executes dropped EXE
PID:2476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE48⤵
- Executes dropped EXE
- Checks computer location settings
PID:1960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"49⤵
- Executes dropped EXE
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE50⤵
- Executes dropped EXE
- Checks computer location settings
PID:2904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"51⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE52⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"53⤵
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE54⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"55⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE56⤵
- Executes dropped EXE
PID:3192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"57⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE58⤵
- Executes dropped EXE
PID:316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"59⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:3636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"61⤵
- Executes dropped EXE
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE62⤵
- Executes dropped EXE
PID:4036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"63⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE64⤵
- Executes dropped EXE
PID:2200 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"65⤵
- Executes dropped EXE
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE66⤵PID:4184
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"67⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE68⤵PID:2280
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"69⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE70⤵
- Modifies registry class
PID:1140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"71⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE72⤵
- Modifies registry class
PID:1184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"73⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE74⤵PID:3980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"75⤵
- Drops file in Windows directory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE76⤵PID:2244
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"77⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE78⤵
- Checks computer location settings
- Modifies registry class
PID:3648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"79⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE80⤵PID:4456
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"81⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE82⤵
- Drops file in Windows directory
PID:1192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"83⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE84⤵PID:4572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"85⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE86⤵PID:4816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"87⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE88⤵PID:3760
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"89⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE90⤵PID:1856
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"91⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE92⤵PID:3876
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"93⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE94⤵PID:520
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"95⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE96⤵PID:4088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"97⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE98⤵PID:1624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"99⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE100⤵PID:1380
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"101⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE102⤵
- Modifies registry class
PID:2096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"103⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE104⤵PID:1600
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"105⤵
- Drops file in Windows directory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE106⤵PID:4596
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"107⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE108⤵PID:3320
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"109⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE110⤵
- Checks computer location settings
PID:2436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"111⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE112⤵
- Drops file in Windows directory
PID:1812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"113⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE114⤵PID:1336
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"115⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE116⤵PID:212
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"117⤵
- Drops file in Windows directory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE118⤵PID:204
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"119⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE120⤵
- Modifies registry class
PID:2012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"121⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE122⤵PID:2348
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"123⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE124⤵PID:2328
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"125⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE126⤵PID:2400
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"127⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE128⤵PID:3104
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"129⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE130⤵
- Checks computer location settings
PID:1212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"131⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE132⤵PID:4312
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"133⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE134⤵
- Checks computer location settings
PID:4848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"135⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE136⤵
- Modifies registry class
PID:4372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"137⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE138⤵PID:4720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"139⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE140⤵PID:4760
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"141⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE142⤵
- Checks computer location settings
PID:4700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"143⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE144⤵PID:1988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"145⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE146⤵PID:5084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"147⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE148⤵PID:4300
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"149⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE150⤵PID:1356
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"151⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE152⤵PID:2412
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"153⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE154⤵PID:4452
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"155⤵
- Drops file in Windows directory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE156⤵PID:1320
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"157⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE158⤵PID:1948
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"159⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE160⤵PID:568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"161⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE162⤵PID:1632
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"163⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE164⤵PID:3088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"165⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE166⤵PID:3932
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"167⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE168⤵
- Checks computer location settings
PID:4596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"169⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE170⤵
- Checks computer location settings
- Modifies registry class
PID:2332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"171⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE172⤵PID:3644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"173⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE174⤵PID:3828
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"175⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE176⤵PID:1336
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"177⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE178⤵
- Modifies registry class
PID:316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"179⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE180⤵
- Checks computer location settings
PID:1984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"181⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE182⤵PID:4864
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"183⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE184⤵
- Drops file in Windows directory
PID:1428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"185⤵
- Drops file in Windows directory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE186⤵PID:4424
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"187⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE188⤵PID:4680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"189⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE190⤵
- Drops file in Windows directory
PID:1804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"191⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE192⤵PID:320
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"193⤵
- Drops file in Windows directory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE194⤵PID:3332
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"195⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE196⤵PID:3652
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"197⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE198⤵PID:4160
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"199⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE200⤵PID:4800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"201⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE202⤵PID:2532
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"203⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE204⤵PID:4700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"205⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE206⤵
- Checks computer location settings
PID:4208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"207⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE208⤵PID:3000
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"209⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE210⤵PID:3444
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"211⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE212⤵PID:3984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"213⤵
- Drops file in Windows directory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE214⤵
- Modifies registry class
PID:3272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"215⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE216⤵
- Checks computer location settings
PID:4408 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"217⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE218⤵PID:2368
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"219⤵
- Drops file in Windows directory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE220⤵PID:4388
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"221⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE222⤵
- Modifies registry class
PID:4780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"223⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE224⤵
- Modifies registry class
PID:1600 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"225⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE226⤵PID:3508
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"227⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE228⤵
- Checks computer location settings
PID:3040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"229⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE230⤵PID:4716
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"231⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE232⤵PID:1904
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"233⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE234⤵PID:3828
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"235⤵PID:236
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE236⤵
- Modifies registry class
PID:1336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"237⤵PID:264
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE238⤵
- Drops file in Windows directory
- Modifies registry class
PID:316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"239⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE240⤵PID:1984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE"241⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\52D5C3~1.EXE242⤵PID:4952